A Comprehensive and Comparative Metric for Information Security
نویسندگان
چکیده
Measurement of information security is important for organizations to justify security decisions and investments. Unfortunately, there are no metrics available that allow for a comprehensive security assessment of an entire organization. It turned out that there are two main aspects which are important to develop such a metric. On the one hand, an appropriate security indicator is required and, on the other hand, a method for combining single security aspects to an overall security measure for an entire organization. An approach fulfilling these two aspects is presented in this article. Besides a comparable indicator, based on the intuitive understanding of security, an approach is proposed for combining single security aspects to reflect the organization’s security assessment. The presented approach was evaluated on a small university department. It will influence on forthcoming ISO 27004 metric-standard, which aligns with the already existing and well known ISO 17799. 1. Motivation and Objectives Number and severity of attacks against the IT-infrastructure of almost any organization is steadily growing [19]. Additionally, the number of uncovered security threats grows, for example in operating systems. Thus, the organization is under growing risk: intruders are able to attack organizations and might cause * Corresponding author: Dr. Falko Dressler, Dept. of Computer Science 7, University of Erlangen, Martensstr. 3, 91058 Erlangen, Germany; Telephone: +49 9131 85-27914, Email: [email protected] enormous damage. As a result, organizations are likely to loose assets and conclusively to loose money. In order to avoid such loss, organizations try to secure their systems and to save money by installing controls. However, the question arises where to invest and especially how much. Installing very many controls usually leads to an improved security, but to high costs due to installation and maintenance. In opposite, installation of none or not enough controls will lead to large and expensive security incidents, which, in turn, might be also very expensive for the organization. Therefore, there is a growing requirement for an appropriate measure for evaluating the security of an entire organization. Moreover, there is an additional reason measuring the security risks of an organization: security risks usually influence the operational risk of an organization. Due to BASEL II [1], the operational risk of an organization has become an important aspect for loan granting.
منابع مشابه
Comparative Advantage, Self-sufficiency and Food Security in Iran: Case Study of Wheat Commodity
Food security has a dynamic notion during the time and may be affected by various domestic and global factors.Nevertheless, Iranian policy makers consider food security as same as self-sufficiency in agricultural food products, particularly wheat production. However, self-sufficiency can contribute to food security only if it is in coincidences with comparative advantage and sustainable resourc...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملA Mechanism for Detecting and Identifying DoS attack in VANET
VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...
متن کاملConfidential Business Information in Jurisprudence and Iranian law
As a result of information technology era and possibility of swift access to information, endorsement of Confidential Business Information (CBI) has found an extraordinary importance; whereas the CBI concept and legal warranty in order to support it thoroughly in Iran is not emphasized in the framework of a specific law. This issue has led to legal problems in the trial with allegation of CBI v...
متن کامل