2016 IEEE Symposium on Computer Applications &Amp; Industrial Electronics (ISCAIE) 2016
DOI: 10.1109/iscaie.2016.7575045
|View full text |Cite
|
Sign up to set email alerts
|

Security metrics maturity model for operational security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…[4] performed risk analysis on an e-health self-care system and quantified the metrics using risk assessments technique based on severity and impact. Muthukrishnan et al [56] proposed a quantitative and qualitative metrics maturity method based on a scorecard.…”
Section: Security Metricsmentioning
confidence: 99%
“…[4] performed risk analysis on an e-health self-care system and quantified the metrics using risk assessments technique based on severity and impact. Muthukrishnan et al [56] proposed a quantitative and qualitative metrics maturity method based on a scorecard.…”
Section: Security Metricsmentioning
confidence: 99%
“…The definition of the system in terms of its components, the system is a collection of elements that interact to achieve certain goals. These components / subsystems cannot stand alone, but are interrelated with one another to form a single unit so that the goals and objectives of the system can be achieved (Muthukrishnan and Palaniappan 2016).…”
Section: Literature Review System Basis Conceptmentioning
confidence: 99%
“…Science is getting wider, the competition is getting higher. Integration between lecturers and students can be achieved well through a good information system (Muthukrishnan and Palaniappan 2016). The purpose of building an academic information system is to facilitate service and provide the best service to the entire academic community, so that the academic community can obtain information that is fast, accurate, relevant and guaranteed its security (Muthukrishnan and Palaniappan 2016).…”
Section: Introduction Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…They proposed an approach based on ISO/IEC 27001:2013 to evaluate the capability maturity level of information security management. Muthukrisnan and Palaniappan [11] had disscussed their concern with regard to metrics in the information security maturity model. Recognize that the decision to invest in information security must be supported by some indicators or metrics that could be comprehended by the stakeholders and in-the-process, convince them that the investment will reduce the risk from information security issues.…”
Section: B Previous Workmentioning
confidence: 99%