The Method of Implementation of the Numerical IT-Security Metrics in Management Systems

被引:0
|
作者
Livshitz, Ilya [1 ]
Lontsikh, Pavel [2 ]
Eliseev, Sergey [2 ]
机构
[1] ITMO Univ, St Petersburg, Russia
[2] Irkutsk Natl Res Tech Univ, Irkutsk, Russia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The relevance of the publication is called by the attention to the problem of formation of reliable measurement results (estimates) of the IT-Security management systems' (ISMS) effectiveness. Decision-makers must operate reliable results of carrying out the measurements of ISMS based on objective quantitative metrics of IT-Security. Known methods for evaluation of the safety systems are presented excluding the PDCA cycle requirements and apart from the general requirements directly to the ISMS. The study of the applicable standards (ISO, NIST, and GOST) and the current practice allowed us to propose an approach to the explanation of a technique of formation of IT-Security metrics, that numerically let us to assess the effectiveness of the ISMS. The results can find a practical application in the independent efficiency evaluation of the ISMS.
引用
收藏
页码:242 / 247
页数:6
相关论文
共 50 条
  • [21] Trust metrics for survivable security systems
    Daskapan, S
    Vree, WG
    Eldin, AA
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 3128 - 3135
  • [22] On defining security metrics for information systems
    Koltuksuz, A. H.
    Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1706 - 1707
  • [23] Management of Security and Security for Management Systems
    Westphall, Carlos Becker
    Mueller, Peter
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2010, 18 (03) : 241 - 243
  • [24] Management of Security and Security for Management Systems
    Carlos Becker Westphall
    Peter Mueller
    Journal of Network and Systems Management, 2010, 18 : 241 - 243
  • [25] Security metrics models and application with SVM in information security management
    Qu, Wei
    Zhang, De-Zheng
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3234 - +
  • [26] On the Implementation of Metrics in Industrial Embedded Systems
    Ocenasek, Pavel
    Trchalik, Roman
    Sveda, Miroslav
    IFAC WORKSHOP ON PROGRAMMABLE DEVICES AND EMBEDDED SYSTEMS (PDES 2009), PROCEEDINGS, 2009, : 157 - 160
  • [27] Research and Implementation of a Classification Method of Industrial Big Data for Security Management
    Huang, Haibo
    Yan, Min
    Yan, Qiang
    Zhang, Xiaofan
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (11):
  • [28] Performance metrics for information security risk management
    Ryan, Julie J. C. H.
    Ryan, Daniel J.
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 38 - 44
  • [29] APPLIED INFORMATION MANAGEMENT - MANAGEMENT REFERENCE MODEL - SECURITY METRICS
    Doucek, Petr
    IDIMT-2008: MANAGING THE UNMANAGEABLE, 2008, 25 : 81 - 106
  • [30] Security Rating Metrics for Distributed Wireless Systems
    Buriachok, Volodymyr
    Sokolov, Volodymyr
    Skladannyi, Pavlo
    MOMLET&DS-2019: MODERN MACHINE LEARNING TECHNOLOGIES AND DATA SCIENCE, 2019, 2386 : 222 - 233