Security Metrics Foundations for Computer Security

被引:0
|
作者
Trcek, Denis [1 ]
机构
[1] Univ Ljubljana, Fac Comp & Informat Sci, Ljubljana 1000, Slovenia
来源
COMPUTER JOURNAL | 2010年 / 53卷 / 07期
关键词
computer security; risk management; security metrics; economics of security;
D O I
10.1093/comjnl/bxp094
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security has been among top priority in computer information systems for more than a decade. Despite the importance of this area, it is interesting to note that the area still lacks (completeness of) one of its basic elements of scientific arsenal, which is metric. This paper therefore presents the situation in this field by giving an analysis of existing metrics that could serve the above-mentioned purpose. Further, it presents a generic risk management model, and gives an analysis of possibilities for application of these existing metrics to the model. It also introduces new metric elements, where these are lacking. As a result, means are provided that enable evaluation of security in information technology systems in a tangible way. Such an approach is essential for every organization in business areas ranging from economical justifications for new security implementations to customized security services with appropriate service costs calculations, and even development of new business models.
引用
收藏
页码:1106 / 1112
页数:7
相关论文
共 50 条
  • [1] Application of Security Metrics in Auditing Computer Network Security: A Case Study
    Premaratne, Upeka
    Samarabandu, Jagath
    Sidhu, Tarlochan
    Beresh, Bob
    Tan, Jian-Cheng
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION FOR SUSTAINABILITY (ICIAFS), 2008, : 448 - +
  • [2] Measuring Risk: Computer Security Metrics, Automation, and Learning
    Slayton, Rebecca
    [J]. IEEE ANNALS OF THE HISTORY OF COMPUTING, 2015, 37 (02) : 32 - 45
  • [3] Novel Security Metrics for Ranking Vulnerabilities in Computer Networks
    Keramati, Marjan
    Keramati, Mahsa
    [J]. 2014 7TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2014, : 883 - 888
  • [4] Security Metrics and Security Investment Models
    Boehme, Rainer
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 10 - 24
  • [5] Application of Mean Time-to-Compromise and VEAbility Security Metrics in Auditing Computer Network Security
    Husni, Emir
    Kurniati, Yustika
    [J]. 2014 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2014,
  • [6] Preface of Special Issue on “Computer Security: Foundations and Automated Reasoning”
    Lujo Bauer
    Sandro Etalle
    Jerry den Hartog
    Luca Viganò
    [J]. Journal of Automated Reasoning, 2011, 46 : 223 - 224
  • [7] Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations
    Kohno, Tadayoshi
    Acar, Yasemin
    Loh, Wulf
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 5145 - 5162
  • [8] Dynamical calculation of security metrics for countermeasure selection in computer networks
    Kotenko, Igor
    Doynikova, Elena
    [J]. 2016 24TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP), 2016, : 558 - 565
  • [9] Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning"
    Bauer, Lujo
    Etalle, Sandro
    den Hartog, Jerry
    Vigano, Luca
    [J]. JOURNAL OF AUTOMATED REASONING, 2011, 46 (3-4) : 223 - 224
  • [10] Computer science with security; security with computer science
    Die Vorstandsperspektive
    [J]. Liggesmeyer, P. (peter.liggesmeyer@gi.de), 1600, Springer Verlag, Tiergartenstrasse 17, Heidelberg, D-69121, Germany (36):