Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provide the basis for management decisions that affect the protection of the infrastructure. A cyber security technical metric is the security relevant output from an explicit mathematical model that makes use of objective measurements of a technical object. A specific set of technical security metrics are proposed for use by the operators of control systems. Our proposed metrics are based on seven security ideals associated with seven corresponding abstract dimensions of security. We have defined at least one metric for each of the seven ideals. Each metric is a measure of ...
In recent years, Industrial Control Systems (ICS) have become an appealing target for cyber attacks,...
In recent years, Industrial Control Systems (ICS) have become increasingly exposed to a wide range o...
This paper documents and analyses a number of security metrics currently in popular use. These will ...
Abstract. Much of the world's critical infrastructure is at risk from attack through electronic...
The Department of Homeland Security National Cyber Security Division supported development of a smal...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
This is a preprint of a paper intended for publication in a journal or proceedings. Since changes ma...
The management of information security becomes easier if suitable metrics can be developed to offer ...
The management of information security becomes easier if suitable metrics can be developed to offer ...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
There exists a large number of suggestions for how to measure security, and in many cases the goal i...
Technical security metrics provide measurements in ensuring the effectiveness of technical security ...
Technical security metrics provide measurements in ensuring the effectiveness of technical security ...
In order to obtain evidence of the security and privacy issues of products, services or an organizat...
In recent years, Industrial Control Systems (ICS) have become an appealing target for cyber attacks,...
In recent years, Industrial Control Systems (ICS) have become increasingly exposed to a wide range o...
This paper documents and analyses a number of security metrics currently in popular use. These will ...
Abstract. Much of the world's critical infrastructure is at risk from attack through electronic...
The Department of Homeland Security National Cyber Security Division supported development of a smal...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
This is a preprint of a paper intended for publication in a journal or proceedings. Since changes ma...
The management of information security becomes easier if suitable metrics can be developed to offer ...
The management of information security becomes easier if suitable metrics can be developed to offer ...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
There exists a large number of suggestions for how to measure security, and in many cases the goal i...
Technical security metrics provide measurements in ensuring the effectiveness of technical security ...
Technical security metrics provide measurements in ensuring the effectiveness of technical security ...
In order to obtain evidence of the security and privacy issues of products, services or an organizat...
In recent years, Industrial Control Systems (ICS) have become an appealing target for cyber attacks,...
In recent years, Industrial Control Systems (ICS) have become increasingly exposed to a wide range o...
This paper documents and analyses a number of security metrics currently in popular use. These will ...