Measuring the security level of an information system to acquire reliable perception of its state requires the use of various different security metrics that can provide extensive security evidence of the system. Visualization can then be used to facilitate the management of the security metrics and measurements and to enhance understanding on their relationships. This paper introduces a tool for modeling and monitoring the security state of a system and focuses on the visualization aspects of the tool. The security metrics of a system are organized hierarchically in the tool, so that more general and conceptual security metrics on the higher levels are connected to detailed, low-level measurements. The tool helps bring meaningfulness to th...
We introduce a novel high-level security metrics objective taxonomization model for software- intens...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
Measuring the security level of an information system to acquire reliable perception of its state re...
Sufficient and credible information security measurement in software-intensive systems requires use ...
Designing and maintaining correct security countermeasures to support trustworthiness require compre...
Measuring security is an important step in creating and deploying secure applications. In order to e...
The management of information security becomes easier if suitable metrics can be developed to offer ...
Measurement is one of the foundations of sound engineering practices, be-cause-as Tom DeMarco put it...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
In this paper, basic issues of measuring security as a system property are discussed. While traditi...
Measuring security is widely accepted to be an important aspect of creating, deploying and main-tain...
The concept of security metrics is a very important aspect for information security management. Secu...
Appropriate information security solutions for software-intensive systems, together with evidence of...
Existing security technologies play a significant role in protecting enterprise systems but they are...
We introduce a novel high-level security metrics objective taxonomization model for software- intens...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
Measuring the security level of an information system to acquire reliable perception of its state re...
Sufficient and credible information security measurement in software-intensive systems requires use ...
Designing and maintaining correct security countermeasures to support trustworthiness require compre...
Measuring security is an important step in creating and deploying secure applications. In order to e...
The management of information security becomes easier if suitable metrics can be developed to offer ...
Measurement is one of the foundations of sound engineering practices, be-cause-as Tom DeMarco put it...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
In this paper, basic issues of measuring security as a system property are discussed. While traditi...
Measuring security is widely accepted to be an important aspect of creating, deploying and main-tain...
The concept of security metrics is a very important aspect for information security management. Secu...
Appropriate information security solutions for software-intensive systems, together with evidence of...
Existing security technologies play a significant role in protecting enterprise systems but they are...
We introduce a novel high-level security metrics objective taxonomization model for software- intens...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...