Yahoo Αναζήτηση Διαδυκτίου

Αποτελέσματα Αναζήτησης

  1. In particular, this chapter explores two distinct issues: (i) how to define and use metrics as quantitative characteristics to represent the security state of a network, and (ii) how to define and use metrics to measure CSA from a defender’s point of view.

  2. Security metrics generally focus on security practices and security capabilities (i.e., capabilities supporting the security objectives of confidentiality, integrity, availability, and accountability), or on metrics related to asset loss, rather than on mission assurance.

  3. 14 Νοε 2008 · Effective security metrics should be used to identify weaknesses, determine trends to better utilize security resources, and judge the success or failure of implemented security solutions.

  4. NIST SP 800-55, Security Metrics Guide for Information Technology Systems , and NIST Draft SP 800-80, Guide to Developing Performance Metrics for Information Security, both addressed information security measurement.

  5. Cyber security metrics and measures can help organizations (i) verify that their secu-rity controls are in compliance with a policy, process, or procedure; (ii) identify their security strengths and weaknesses; and (iii) identify security trends, both within and outside the organization’s control.

  6. 16 Ιουλ 2008 · This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and procedures. It provides an approach to help management decide where to invest in additional security protection resources or identify and evaluate...

  7. 61 development, selection, and prioritization of information security measures. This 62 volume explores both quantitative and qualitative assessment and provides basic 63 guidance on data analysis techniques as well as impact and likelihood modeling. 64 • Volume 2 – Developing an Information Security Measurement Program - is a

  1. Γίνεται επίσης αναζήτηση για