The Method of Implementation of the Numerical IT-Security Metrics in Management Systems

被引:0
|
作者
Livshitz, Ilya [1 ]
Lontsikh, Pavel [2 ]
Eliseev, Sergey [2 ]
机构
[1] ITMO Univ, St Petersburg, Russia
[2] Irkutsk Natl Res Tech Univ, Irkutsk, Russia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The relevance of the publication is called by the attention to the problem of formation of reliable measurement results (estimates) of the IT-Security management systems' (ISMS) effectiveness. Decision-makers must operate reliable results of carrying out the measurements of ISMS based on objective quantitative metrics of IT-Security. Known methods for evaluation of the safety systems are presented excluding the PDCA cycle requirements and apart from the general requirements directly to the ISMS. The study of the applicable standards (ISO, NIST, and GOST) and the current practice allowed us to propose an approach to the explanation of a technique of formation of IT-Security metrics, that numerically let us to assess the effectiveness of the ISMS. The results can find a practical application in the independent efficiency evaluation of the ISMS.
引用
收藏
页码:242 / 247
页数:6
相关论文
共 50 条
  • [41] MANAGEMENT GUIDELINES FOR COMPUTER SECURITY IMPLEMENTATION
    WILLSHER, S
    INFORMATION PRIVACY, 1980, 2 (03): : 102 - 105
  • [42] Quantifiable security metrics for large scale heterogeneous systems
    Naqvi, Syed
    Riguidel, Michel
    2006: 40TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCES SECURITY TECHNOLOGY, PROCEEDINGS, 2006, : 209 - +
  • [43] A Benchmark of Security Metrics in Cyber-Physical Systems
    Aigner, Andreas
    Khelil, Abdelmajid
    2020 IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION AND NETWORKING (SECONWORKSHOPS), 2020,
  • [44] A NUMERICAL IMPLEMENTATION OF MELNIKOV METHOD
    LING, FH
    BAO, GW
    PHYSICS LETTERS A, 1987, 122 (08) : 413 - 417
  • [45] Implementation of Information Security Management Systems for Data Protection in Organizations: A systematic literature review
    Marhad, Siti Suhaida
    Abd Goni, Siti Zaleha
    Sani, Mad Khir Johari Abdullah
    ENVIRONMENT-BEHAVIOUR PROCEEDINGS JOURNAL, 2024, 9 : 197 - 203
  • [46] Implementation of Information Security Management Systems for Data Protection in Organizations: A systematic literature review
    Marhad, Siti Suhaida
    Goni, Siti Zaleha Abd
    Sani, Mad Khir Johari Abdullah
    ENVIRONMENT-BEHAVIOUR PROCEEDINGS JOURNAL, 2024, 9 : 197 - 203
  • [47] Expert systems for Information Security Management and Audit. Implementation phase issues.
    Kanatov, Maksat
    Atymtayeva, Lyazzat
    Yagaliyeva, Bagdat
    2014 JOINT 7TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS (SCIS) AND 15TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS (ISIS), 2014, : 896 - 900
  • [48] The Implementation of Flipped Classroom Assisted by Learning Management System for Numerical Method Courses
    Pramita, Mitra
    Sukmawati, R. Ati
    Sari, Delsika Pramata
    PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON CREATIVITY, INNOVATION AND TECHNOLOGY IN EDUCATION (IC-CITE 2018), 2018, 274 : 158 - 162
  • [49] Microservice Security Metrics for Secure Communication, Identity Management, and Observability
    Zdun, Uwe
    Queval, Pierre-Jean
    Simhandl, Georg
    Scandariato, Riccardo
    Chakravarty, Somik
    Jelic, Marjan
    Jovanovic, Aleksandar
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2023, 32 (01)
  • [50] Systems analysis of security management
    Sienkiewicz, Piotr
    SCIENTIFIC JOURNALS OF THE MARITIME UNIVERSITY OF SZCZECIN-ZESZYTY NAUKOWE AKADEMII MORSKIEJ W SZCZECINIE, 2010, 24 (96): : 93 - 99