Sufficient and credible information security measurement in software-intensive systems requires use of a variety of security metrics offering security-related evidence from different viewpoints. Visualization is needed to facilitate management of security metrics and measurements and to increase the meaningfulness of them in decision-making such as security assurance and risk management. We introduce a novel visualization and modeling tool for hierarchical specification and deployment of security metrics and measurements. The tool connects high-level risk-driven security objectives with detailed measurements and evidence gathering. The tool facilitates the management of a large number of metrics and measurements without losing appropriate g...
Understanding and analysing security risks is an essential task when designing and maintaining a sys...
AbstractUnderstanding and analysing security risks is an essential task when designing and maintaini...
Designing and maintaining correct security countermeasures to support trustworthiness require compre...
Sufficient and credible information security measurement in software-intensive systems requires use ...
Measuring the security level of an information system to acquire reliable perception of its state re...
Carefully designed information security metrics enable informed and effective decision making. Howev...
The need for effective and efficient information security solutions is steadily increasing in the so...
Measuring security is an important step in creating and deploying secure applications. In order to e...
Existing security technologies play a significant role in protecting enterprise systems but they are...
An efficient IT security management relies upon the ability to make a good compromise between the co...
The management of information security becomes easier if suitable metrics can be developed to offer ...
The need for effective and efficient information security solutions is steadily increasing in the so...
The concept of security metrics is a very important aspect for information security management. Secu...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
We introduce a novel high-level security metrics objective taxonomization model for software- intens...
Understanding and analysing security risks is an essential task when designing and maintaining a sys...
AbstractUnderstanding and analysing security risks is an essential task when designing and maintaini...
Designing and maintaining correct security countermeasures to support trustworthiness require compre...
Sufficient and credible information security measurement in software-intensive systems requires use ...
Measuring the security level of an information system to acquire reliable perception of its state re...
Carefully designed information security metrics enable informed and effective decision making. Howev...
The need for effective and efficient information security solutions is steadily increasing in the so...
Measuring security is an important step in creating and deploying secure applications. In order to e...
Existing security technologies play a significant role in protecting enterprise systems but they are...
An efficient IT security management relies upon the ability to make a good compromise between the co...
The management of information security becomes easier if suitable metrics can be developed to offer ...
The need for effective and efficient information security solutions is steadily increasing in the so...
The concept of security metrics is a very important aspect for information security management. Secu...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
We introduce a novel high-level security metrics objective taxonomization model for software- intens...
Understanding and analysing security risks is an essential task when designing and maintaining a sys...
AbstractUnderstanding and analysing security risks is an essential task when designing and maintaini...
Designing and maintaining correct security countermeasures to support trustworthiness require compre...