Method for assessing efficiency of the information security management system

被引:2
|
作者
Kiedrowicz, Maciej [1 ]
Stanik, Jerzy [1 ]
机构
[1] Mil Univ Technol, Fac Cybernet, Urbanowicza Str 2, Warsaw, Poland
关键词
security; security system; security configuration; configuration of security measures; loss of efficiency of the security system;
D O I
10.1051/matecconf/201821004011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The article addresses the issue of efficiency assessment of the security system (SS) in terms of the Information Security Management System (information resources of the information system in an organization). It is assumed that the purpose of such security system is to achieve a declared level of protection of the information system resources. Therefore, the level of security of information system in a given organization shall be determined by the efficiency assessment of the security system. The efficiency of the security system mainly depends on the functional properties of its components and other factors occurring in its environment. The article mainly focuses on security configuration, i.e. technical configuration and security organization configuration. The thesis was adopted that the efficiency of the security system may be considered as a set-theoretic efficiency sum of the security configurations invoked in such system. Additionally, it was assumed that a prerequisite for the desired measures (indicators) of the efficiency assessment of the SS shall be to propose such measures and develop appropriate ways (methods) of their calculation. The efficiency measure for the SS as well as two methods of efficiency assessment of the SS were proposed in the article.
引用
下载
收藏
页数:7
相关论文
共 50 条
  • [31] Constructiaon of Management System on the Enterprise Information Security
    Liu, Qiao-rong
    Kang, Xiao-juan
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 2160 - 2163
  • [32] The Study of Housing Security Management information System
    Xia Shizhen
    Li Xiaodong
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON CONSTRUCTION & REAL ESTATE MANAGEMENT, VOLS 1 AND 2, 2009, : 748 - 752
  • [33] The importance of information security management system establishment
    Ćutić Cerovac, J. (jadranka.cutic-cerovac@mirovinsko.hr), Ericsson Nikola Tesla, Zagreb; et al; Koncar - Electrical lndustries, Croatia; Siemens, Croatia; T-Croatian Telecom; T-Mobile Croatia (Croatian Society for Information and Communication Technology):
  • [34] Information Security Management: A System Dynamics Approach
    Nazareth, Derek L.
    Choi, Jae
    AMCIS 2012 PROCEEDINGS, 2012,
  • [35] Information Security Emergency Plan Management System
    Lingaraj, K.
    Sreekanth, N.
    Kaja, Moddiudin
    Lokesh, K. M. S.
    Prashanth, Keni
    Nagaveni, V. Biradhar
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 129 - 137
  • [36] AUDIT AND INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION
    Drastich, Martin
    SBORNIK Z MEZINARODNI VEDECKE KONFERENCE ZNALOSTI PRO TRZNI PRAXI 2012: VYZNAM ZNALOSTI V AKTUALNI FAZI EKONOMICKEHO CYKLU, 2012, : 49 - 52
  • [37] Information security management system: Processes and products
    Eloff, MM
    Eloff, JHP
    SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 193 - 204
  • [38] Hospital Information System Management and Security Maintenance
    Wei, Xianmin
    2010 INTERNATIONAL CONFERENCE ON BIO-INSPIRED SYSTEMS AND SIGNAL PROCESSING (ICBSSP 2010), 2010, : 100 - 102
  • [39] Architecture of an Intelligent System for Information Security Management
    Jafarov, Zafar
    2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2013, : 181 - +
  • [40] Study on Efficiency of Risk Management for Information Security Based on Transaction
    Lu, Zhigang
    Wang, Xiaozhen
    Liu, Baoxu
    Xu, Rongsheng
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL II, 2009, : 356 - 360