Information security evaluation methods ABSTRACT FOR THE 1 SWEDISH IT SECURITY NETWORK FOR PHD STUDENTS SEMINAR, 2-3 APRIL 2001, IN SUNNE
نویسنده
چکیده
Abstract: The starting point of the study presented here was to scan the literature for information security evaluation methods. The “unit of evaluation” and whishedfor application situation is identified for each of the methods, and these are classified in a basic model. The aim is to support information security practitioners and researchers in their selection of evaluation methods by means of investigating and clarifying in which situation each method can be employed. Those of the surveyed methods that are considered suitable for evaluation of the organisational aspects of information security are examined further. A brief comparative analysis is performed to identify similarities and differences, aiming to make explicit notable differences in methodological approach.
منابع مشابه
A New Method for Intrusion Detection Using Genetic Algorithm and Neural network
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
متن کاملConsidering the Coefficient of Relationship between the Students’ Attitude toward Social Networks Policy making with Social Security Feeling
Abstract:This study aims at measuring the relationship between students‟ attitude toward govern-ment‟s virtual social network policy making with social security feeling, in another word, to which extent social security feeling emphasizing on social networks is determined via users‟ attitude toward government‟s media policy making? Analytical-descriptive method including survey is used in ...
متن کاملFirewall Evaluation Criteria - An evaluation
In a time where more business is conducted over the Internet, the security of such systems, for instance electronic money transfer, becomes critical. A firewall serves as a frontline of the security measures that can be taken by an organisation in order to secure the integrity of a private network. This report describes methods of evaluating the security of a firewall. The existing methods on t...
متن کاملEvaluation of PhD Curriculum in Health Information Management: A Need for Revision
Objective: Identifying the strengths and weaknesses of curriculums and updating them in accordance with the future needs of students and the qualifications corresponding to their job positions is of particular importance. This study aims to identify the shortcomings of the current curriculum of Health Information Management for PhD students in Iran. Methods: This descriptive study was conducte...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001