Technical security metrics provide measurements in ensuring the effectiveness of technical security controls or technology devices/objects that are used in protecting the information systems. However, lack of understanding and method to develop the technical security metrics may lead to unachievable security control objectives and inefficient implementation. This paper proposes a model of technical security metrics to measure the effectiveness of network security management. The measurement is based on the security performance for (1) network security controls such as firewall, Intrusion Detection Prevention System (IDPS), switch, wireless access point and network architecture; and (2) network services such as Hypertext Transfer Protocol Se...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
The management of information security becomes easier if suitable metrics can be developed to offer ...
In order to better understand the information security performance in products, processes, technical...
Technical security metrics provide measurements in ensuring the effectiveness of technical security ...
Much of the world's critical infrastructure is at risk from attack through electronic networks conne...
Abstract. Much of the world's critical infrastructure is at risk from attack through electronic...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
The relevance of the publication is called by the attention to the problem of formation of reliable ...
With the increasing significance of information technology, there is an urgent need for adequate mea...
In order to obtain evidence of the security and privacy issues of products, services or an organizat...
The concept of security metrics is a very important aspect for information security management. Secu...
Abstract: In order to better understand the information security performance in products, processes,...
Systematic approaches to measuring security are needed in order to obtain evidence of the security p...
The management of information security becomes easier if suitable metrics can be developed to offer ...
Inform ation and com m unications technology (ICT) is at the forefront of the current w ave of techn...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
The management of information security becomes easier if suitable metrics can be developed to offer ...
In order to better understand the information security performance in products, processes, technical...
Technical security metrics provide measurements in ensuring the effectiveness of technical security ...
Much of the world's critical infrastructure is at risk from attack through electronic networks conne...
Abstract. Much of the world's critical infrastructure is at risk from attack through electronic...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
The relevance of the publication is called by the attention to the problem of formation of reliable ...
With the increasing significance of information technology, there is an urgent need for adequate mea...
In order to obtain evidence of the security and privacy issues of products, services or an organizat...
The concept of security metrics is a very important aspect for information security management. Secu...
Abstract: In order to better understand the information security performance in products, processes,...
Systematic approaches to measuring security are needed in order to obtain evidence of the security p...
The management of information security becomes easier if suitable metrics can be developed to offer ...
Inform ation and com m unications technology (ICT) is at the forefront of the current w ave of techn...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
The management of information security becomes easier if suitable metrics can be developed to offer ...
In order to better understand the information security performance in products, processes, technical...