The Method of Implementation of the Numerical IT-Security Metrics in Management Systems

被引:0
|
作者
Livshitz, Ilya [1 ]
Lontsikh, Pavel [2 ]
Eliseev, Sergey [2 ]
机构
[1] ITMO Univ, St Petersburg, Russia
[2] Irkutsk Natl Res Tech Univ, Irkutsk, Russia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The relevance of the publication is called by the attention to the problem of formation of reliable measurement results (estimates) of the IT-Security management systems' (ISMS) effectiveness. Decision-makers must operate reliable results of carrying out the measurements of ISMS based on objective quantitative metrics of IT-Security. Known methods for evaluation of the safety systems are presented excluding the PDCA cycle requirements and apart from the general requirements directly to the ISMS. The study of the applicable standards (ISO, NIST, and GOST) and the current practice allowed us to propose an approach to the explanation of a technique of formation of IT-Security metrics, that numerically let us to assess the effectiveness of the ISMS. The results can find a practical application in the independent efficiency evaluation of the ISMS.
引用
收藏
页码:242 / 247
页数:6
相关论文
共 50 条
  • [1] Introduction to IT-security in open systems
    Jerman-Blazic, B
    Schneider, W
    Schwiderski-Grosche, S
    ADVANCED SECURITY TECHNOLOGIES IN NETWORKING, 2001, 178 : 3 - 19
  • [2] Artificial Immune Systems for IT-Security
    Stibor, Thomas
    Eckert, Claudia
    Timmis, Jonathan
    IT-INFORMATION TECHNOLOGY, 2006, 48 (03): : 168 - 173
  • [3] Information systems security metrics management
    Kovacich, G
    COMPUTERS & SECURITY, 1997, 16 (07) : 610 - 618
  • [4] Information systems security metrics management
    Kovacich, Gerald
    Computers and Security, 1997, 16 (07): : 610 - 618
  • [5] IT-security challenges in IoT environments and autonomous systems
    Heun, Ulrich
    MICRO- AND NANOTECHNOLOGY SENSORS, SYSTEMS, AND APPLICATIONS IX, 2017, 10194
  • [6] Network Security Metrics and Performance for Healthcare Systems Management
    Liu, Vicky
    Tesfamicael, Aklilu Daniel
    Caelli, William
    Sahama, Tony
    2015 17TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATION & SERVICES (HEALTHCOM), 2015, : 189 - 194
  • [7] Conceptual Information Systems discussed through an IT-security tool
    Becker, K
    Stumme, G
    Wille, R
    Wille, U
    Zickwolff, M
    KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT, PROCEEDINGS: METHODS, MODELS, AND TOOLS, 2000, 1937 : 352 - 365
  • [8] A Security Metrics Development Method for Software Intensive Systems
    Savola, Reijo M.
    ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 11 - 16
  • [9] Reference Project for IT-Security protects Systems against Attacks
    不详
    ATP EDITION, 2016, (1-2): : 9 - 9
  • [10] Virtual machine management for Tele-Lab "IT-Security" Server
    Hu, J
    Cordel, D
    Meinel, C
    10TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2005, : 448 - 453