Taxonomy of cyber security metrics to measure strength of cyber security

被引:14
作者
Gupta Bhol S. [1 ]
Mohanty J.R. [1 ]
Kumar Pattnaik P. [1 ]
机构
[1] School of Computer Engineering, KIIT Deemed to be University, Odisha, Bhubaneswar
关键词
Cyber Risks; Cyber security; MCDM; Metrics; Taxonomy; Vulnerabilities;
D O I
10.1016/j.matpr.2021.06.228
中图分类号
学科分类号
摘要
Cyber security is guarding computer systems, data, network and other resources from unauthorized access and malicious users. There are no direct methods of measuring strength of cyber security. As they say, “You can't manage what you can't measure”. One can easily track the efforts taken for security through cyber security metrics. Being a quantifiable measure, metric can be utilized in tracking the status of a specific process and assess its outcomes along with its strength. This work aims to provide taxonomy of cyber security metrics with five basic metrics, along with the tools under Multi Criteria Decision making approach can be used in evaluation of cyber security strength. © 2021
引用
收藏
页码:2274 / 2279
页数:5
相关论文
共 30 条
[1]  
Lahcen M., Caulkins R.A., Mohapatra B., Review and insight on the behavioral aspects of cybersecurity, Cybersecurity, 3, 10, (2020)
[2]  
Bendovschi A., Cyber Attacks – trends, patterns and security countermeasures, Proc. Econ. Finance, 28, pp. 24-31, (2015)
[3]  
Muiyuro A., Cybersecurity Metrics, Supporting accurate and timely decision-making, Cybersecurity Metrics & Dashboards, pp. 1-25, (2018)
[4]  
Swanson M., Bartol N., Sabato J., Hash J., Graffo L., Security Metrics Guide for Information Technology Systems, NIST Spec. Publ., 800-55, (2003)
[5]  
Quigley K., Roy J., Cyber-security and risk management in an interoperable world: an examination of governmental action in North America, Social Science Computer Review, 30, 1, pp. 83-94, (2011)
[6]  
El Mrabet Z., Kaabouch N., El Ghazi H., El Ghazi H., Cyber-security in smart grid: Survey and challenges, Comput. Electr. Eng., 67, pp. 469-482, (2018)
[7]  
Yang C., Xu J., Liang S., DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection, Cybersecurity, 4, 16, (2021)
[8]  
Black P.E., Scarfone K., M., Souppaya: Cyber security metrics and measures, Handbook of Science and Technology for Homeland Security, 5, pp. 1-10, (2008)
[9]  
Pendleton M., Lebron R.G., Cho J.H., (2017)
[10]  
Moitra S.D., Data needs for Network security metrics: A measure and manage approach, ISSA Journal, pp. 31-36, (2012)