2008 the Third International Conference on Internet Monitoring and Protection 2008
DOI: 10.1109/icimp.2008.34
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Security Measurements and Metrics for Risk Assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Some developed countries which applied security precaution system earlier have achieved desirable results in their studies and practice of performance evaluation [5][6] [7]. For example, the U.S. has developed various simulation models of safety precautions to aid the practice of performance evaluation of security systems targeted for preventing an invasion, some typical simulation models such as [8] [9][10] ASSESS (Analytic System and Software for Evaluating Safeguards and Security) ,FESEM (Forcible Entry Safeguards Effectiveness Model), ISEM (Insider Safeguards Effectiveness Model) , SAFE (Safeguards Automated Facility Evaluation) and etc.…”
Section: Gray System Methodsmentioning
confidence: 97%
“…Some developed countries which applied security precaution system earlier have achieved desirable results in their studies and practice of performance evaluation [5][6] [7]. For example, the U.S. has developed various simulation models of safety precautions to aid the practice of performance evaluation of security systems targeted for preventing an invasion, some typical simulation models such as [8] [9][10] ASSESS (Analytic System and Software for Evaluating Safeguards and Security) ,FESEM (Forcible Entry Safeguards Effectiveness Model), ISEM (Insider Safeguards Effectiveness Model) , SAFE (Safeguards Automated Facility Evaluation) and etc.…”
Section: Gray System Methodsmentioning
confidence: 97%
“…The comparative analysis of some management security standards for information systems was studied by Sipponen and Willison [21], adopting them to validate the market's acceptable practices. At the same time, Tashi and Outi-Hélie [22] sought to analyze the evaluation metrics for security standards following ISO 17799: 2005 and ISO 27001 standards.…”
Section: B Information Security and The Common Criteria Standardmentioning
confidence: 99%
“…The discussion about information security in scientific literature shows a search for the foundation of cybersecurity systems and an effort to develop tools and methodologies for product homologation [12,13,14,18,21,22,23,24,77]. Moreover, national systems and private companies have invested in such an effort as they could and should be expected to do [19,66,61].…”
Section: Summary and Decision About Information Security Standardsmentioning
confidence: 99%