An Algorithm Design to Evaluate the Security Level of an Information System

被引:0
|
作者
Thalia, Sunil [1 ]
Tuteja, Asma [2 ]
Dutta, Maitreyee [1 ,3 ]
机构
[1] NITTTR, Chandigarh, India
[2] MITS Univ, Laxmangarh, Rajasthan, India
[3] NITTTR, Chandigarh, India
关键词
Information system; Security metrics; Analytic hierarchy process;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Measuring the security of an Information System has become a critical issue in the era of Information Technology. As any other process, security can not be improved, if it can not be measured. The need of security metrics is important for assessing the current security status. Since all systems and organizations are different, there is no single set of metrics that is generally applicable. This paper presents an algorithm to develop the necessary security metrics for assessing the information system in a structured way and a quantitative evaluation model with qualitative decision based on Analytic Hierarchy Process (AHP) to measure the security level of the Information System. At last, a test case is given to illustrate the algorithm and effectiveness of this model.
引用
收藏
页码:69 / +
页数:2
相关论文
共 50 条
  • [1] THE ANALYSIS AND DESIGN OF ACCOUNTING INFORMATION SECURITY SYSTEM BASED ON AES ALGORITHM
    Zhu, Qing-Xiang
    Li, Lu
    Liu, Jing
    Xu, Nan
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 2713 - +
  • [2] The security system for maintenance of the required information security level
    Kiedrowicz, Maciej
    Stanik, Jerzy
    22ND INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATIONS AND COMPUTERS (CSCC 2018), 2018, 210
  • [3] TWO LEVEL ENCRYPTION - A NEW ALGORITHM FOR INFORMATION SECURITY
    Maitra, Subhashis
    ICMEE 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON MECHANICAL AND ELECTRONICS ENGINEERING, 2010, : 71 - 74
  • [4] Research on information security model and security system design
    Huang, Yi-Min
    Ping, Ling-Di
    Pan, Xue-Zeng
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2001, 35 (06): : 603 - 607
  • [5] Design of Information Security Access System in the Power Grid Based on Improved Bayesian Algorithm
    Wenwen Liu
    Haolan Wu
    Fei Yu
    Qiang Wei
    Wireless Personal Communications, 2022, 127 : 543 - 559
  • [6] Design of Information Security Access System in the Power Grid Based on Improved Bayesian Algorithm
    Liu, Wenwen
    Wu, Haolan
    Yu, Fei
    Wei, Qiang
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (01) : 543 - 559
  • [7] Fuzzy Comprehensive Evaluation Algorithm for Power Information System Security Level Based on the Internet of Things
    Zeng Ming
    Wang Shicheng
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (05) : 17 - 21
  • [8] Design of Network Security Defense System for Information System
    Li, Kexin
    Xia, Hongsen
    Zhong, Ling
    PROCEEDINGS OF ANNUAL CONFERENCE OF CHINA INSTITUTE OF COMMUNICATIONS, 2010, : 301 - 303
  • [9] Analyzing Structural Security Posture to Evaluate System Design Decisions
    Samuel, Joe
    Jaskolka, Jason
    Yee, George O. M.
    2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 8 - 17
  • [10] The Measurement Design of Information Security Management System
    Nancylia, Merry
    Mudjtabar, Eddy K.
    Sutikno, Sarwono
    Rosmansyah, Yusep
    2014 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2014,