نتایج جستجو برای: security evaluation

تعداد نتایج: 991221  

2017
Yuanquan Shi Tao Li Renfa Li Xiaoning Peng Pengju Tang

To effectively perceive network security situation under IOT environment, an Immunity-based IOT Environment Security Situation Awareness (IIESSA) model is proposed. In IIESSA, some formal definitions for self, non-self, antigen and detector are given. According to the relationship between the antibody-concentration of memory detectors and the intensity of network attack activities, the security...

2007
David Lie Mahadev Satyanarayanan

Security researchers and practitioners lack techniques to quantitatively evaluate the strength of security systems against a determined attacker. Currently, evaluation is either qualitative, such as through security certification standards, or ad-hoc, such as through penetration testing and auditing. In this paper, we propose a framework that if applied to security systems, would produce quanti...

2004
W. G. Bornman

Organisations are under constant pressure from governments and industry to implement risk management methods. There are various information security risk management methods available that organisations can implement, and each has different approaches to identifying, measuring, controlling and monitoring the information security risks. Organisations find it difficult to select an information sec...

2009
Abdulaziz Alkussayer William H. Allen

Software security has become a crucial component of any software system in today’s market. However, the development of secure software is still a maturing process. Software architecture (SA) assessment methods have gained increasing attention in recent years. Most of these evaluation techniques are scenario-based, and thus depend heavily on the quality of the scenarios selected for their evalua...

2011
Taeseung Lee Kwang-Woo Lee Dongho Won Namje Park

IT products developed without due consideration of security issues have caused many security accidents over the last ten years. As a result, the importance of security in software development is increasing. It is important to ensure that no known vulnerabilities remain in the design, development, and test stage, in order to develop secure IT products. Even when an IT product is designed securel...

2013
Jakub Breier Ladislav Hudec

Information security plays a key role in protection of organization’s assets. There exist a number of standards and guidelines providing huge lists of security controls that, if properly used, might be useful against cyber threats. However, these standards leave the process of controls selection to the organizations. Security manager has to carry out a decision on implementation of security con...

2014
Jakub Breier

Information security plays a key role in protection of organization’s assets. There exist a number of standards and guidelines providing huge lists of security controls that, if properly used, might be useful against cyber threats. However, these standards leave the process of controls selection to the organizations. Security manager has to carry out a decision on implementation of security con...

Journal: :JoWUA 2015
Andrey Fedorchenko Igor V. Kotenko Andrey Chechulin

Security evaluation systems usually use various information sources to estimate computer network security. One of the important tasks in these systems is integration and storage of information from various sources. The paper is devoted to investigation and development of models and methods to integrate open security databases into one repository. The model of integration proposed in the paper h...

2004
Job Asheri Chaula Louise Yngström Stewart Kowalski

The evaluation of information systems security is a process in which the evidence for assurance is identified, gathered, and analysed against criteria for security functionality and assurance level. This can result in a measure of trust that indicates how well the system meets particular security target. However, as the information systems complexity increases, it becomes increasingly hard to a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید