Security Evaluation Expert System

ثبت نشده
چکیده

Software is an important resource. It contains and controls data and other resources. Thus measures must be taken to protect that data and resources. Thus Software Metrics are measurement of some properties of a piece of software or its specifications. Metrics are very important in Software Quality Measurement. Since Tom De Marco rightly stated “You can’t control what you can’t measure.” Software control is the part of Software Risk Management Process. Software metrics are calculated on the basis of software risks encountered or which are imminent. Risk-aware organizations may choose proactively to specify, design, implement, operate and maintain their security controls, usually by assessing the risks and implementing a comprehensive security management framework. Many Information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Fuzzy Integrated Evaluation of Enterprise Information System Security Based on EC

As enterprises increase their electronic communication in business activities through network, the security of enterprise information system based on EC becomes crucial for enterprises. This paper proposes a fuzzy integrated security evaluation method based on man-computer combined data collection and fuzzy expert evaluation in Delphi method. The method could reduce the subjectivity of expert e...

متن کامل

Application of BP Neural Network Model based on Particle Swarm Optimization in Enterprise Network Information Security

The development of network technology has brought convenience to people's life, but also provides the convenience for the virus, Trojan and other destructive programs to attack the network. Then, the computer network security is becoming more and more dangerous. Accurately and scientifically predict the risk of network, it can effectively prevent the risk, and reduce the loss caused by the prob...

متن کامل

A Novel Application of Grey Correlation Method to Safety Evaluation of Communication Networks

According to the qualitative safety evaluation index system of electric power communication network, it is easy to occur in the scoring problems, we put forward a kind of expert evaluation data by correlation degree, solve the problem of qualitative index difference. The method based on Relative Grey Relational Analysis on safety evaluation data, the establishment of expert evaluation of the re...

متن کامل

DESIGN AND IMPLEMENTATION OF FUZZY EXPERT SYSTEM FOR REAL ESTATE RECOMMENDATION

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; backgro...

متن کامل

Improving Security Requirements Adequacy An Interval Type 2 Fuzzy Logic Security Assessment System

Organizations rely on security experts to improve the security of their systems. These professionals use background knowledge and experience to align known threats and vulnerabilities before selecting mitigation options. The substantial depth of expertise in any one area (e.g., databases, networks, operating systems) precludes the possibility that an expert would have complete knowledge about a...

متن کامل

DESIGN AND IMPLEMENTATION OF FUZZY EXPERT SYSTEM FOR REAL ESTATE RECOMMENDATION

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; backgro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011