Abstract. System design, development and operational activities are monitored and evaluated to facilitate proper system security management in all phases of the system life-cycle. Effective system security metrics must address all phases of the system life-cycle as well as the associated organizational elements that interact during the system life-cycle to produce and operate the system of interest. A single system security metric, built from multiple components, is presented here as a fundamental system management security metric. This single technical security metric is used to support and evaluate the allocation of corporate and program resources, including time and budget. Introduction. The current state of the international information...
In order to obtain evidence of the security and privacy issues of products, services or an organizat...
Abstract. Much of the world's critical infrastructure is at risk from attack through electronic...
There exists a large number of suggestions for how to measure security, and in many cases the goal i...
The deep integration between the cyber and physical domains in complex systems make very challenging...
Abstract: We introduce a novel high-level security metrics objective taxonomization model for soft-w...
The management of information security becomes easier if suitable metrics can be developed to offer ...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
We introduce a novel high-level security metrics objective taxonomization model for software- intens...
In this paper, basic issues of measuring security as a system property are discussed. While traditi...
Existing security technologies play a significant role in protecting enterprise systems but they are...
The concept of security metrics is a very important aspect for information security management. Secu...
As technology advances and society becomes more dependent on information technology (IT), the exposu...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
An efficient IT security management relies upon the ability to make a good compromise between the co...
In order to obtain evidence of the security and privacy issues of products, services or an organizat...
Abstract. Much of the world's critical infrastructure is at risk from attack through electronic...
There exists a large number of suggestions for how to measure security, and in many cases the goal i...
The deep integration between the cyber and physical domains in complex systems make very challenging...
Abstract: We introduce a novel high-level security metrics objective taxonomization model for soft-w...
The management of information security becomes easier if suitable metrics can be developed to offer ...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
We introduce a novel high-level security metrics objective taxonomization model for software- intens...
In this paper, basic issues of measuring security as a system property are discussed. While traditi...
Existing security technologies play a significant role in protecting enterprise systems but they are...
The concept of security metrics is a very important aspect for information security management. Secu...
As technology advances and society becomes more dependent on information technology (IT), the exposu...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
An efficient IT security management relies upon the ability to make a good compromise between the co...
In order to obtain evidence of the security and privacy issues of products, services or an organizat...
Abstract. Much of the world's critical infrastructure is at risk from attack through electronic...
There exists a large number of suggestions for how to measure security, and in many cases the goal i...