A Conceptual Model for a Metric Based Framework for the Monitoring of Information Security Tasks' Efficiency

被引:5
|
作者
Sonmez, Ferda Ozdemir [1 ]
机构
[1] Univ Mahallesi, Middle East Tech Univ, Inst Informat, Dumlupinar Bulvari 1, TR-06800 Ankara, Turkey
来源
10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS | 2019年 / 160卷
关键词
Information Security Governance; Security; Efficiency; Metric; Productivity;
D O I
10.1016/j.procs.2019.09.459
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Information Security Governance Systems are not adequate to measure the effectiveness and efficiency of security tasks for the enterprises. Although some of the systems offer ways for measurement, they still need the definition of measurement objectives and metrics. This study proposes a conceptual framework mode which has human and tool/process related metrics. This system also allows the collection of evidence data for security-related tasks and ways to motivate the security staff to provide a more productive environment. This system may be applied to any size of enterprise independent of its business domain or functions as long as the aim is to improve the effectiveness and efficiency of security-related tasks. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:181 / 188
页数:8
相关论文
共 50 条
  • [21] A model-based mode-switching framework based on security vulnerability scores
    Riegler, Michael
    Sametinger, Johannes
    Vierhauser, Michael
    Wimmer, Manuel
    JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 200
  • [22] A Machine Learning Based Monitoring Framework for Side-Channel Information Leaks
    Lescisin, Michael
    Mahmoud, Qusay H.
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2021, 2 : 139 - 151
  • [23] Information Security Governance: A model based on the Direct-Control Cycle
    von Solms, Rossouw
    Solms, S. H. Basie von
    COMPUTERS & SECURITY, 2006, 25 (06) : 408 - 412
  • [24] An Access Control Model for Grid Computing Based on Security Information Evaluation
    Xie, Ping
    Zhou, Jiang
    2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 49 - 52
  • [25] A Security Evaluation Model for Edge Information Systems Based on Index Screening
    Guo, Ziyu
    Qi, Jiahao
    Zuo, Jinxin
    Xie, Weixuan
    Lu, Yueming
    Tian, Huiping
    Cao, Ruohan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (12): : 21585 - 21603
  • [26] SDNFV Based Threat Monitoring and Security Framework for Multi-Access Edge Computing Infrastructure
    Krishnan, Prabhakar
    Duttagupta, Subhasri
    Achuthan, Krishnashree
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (06) : 1896 - 1923
  • [27] SDNFV Based Threat Monitoring and Security Framework for Multi-Access Edge Computing Infrastructure
    Prabhakar Krishnan
    Subhasri Duttagupta
    Krishnashree Achuthan
    Mobile Networks and Applications, 2019, 24 : 1896 - 1923
  • [28] Enhanced Information Security in Distributed Mobile System Based on Delegate Object Model
    Shenbagavadivu, N.
    Savithri, S. Usha
    INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND SYSTEM DESIGN 2011, 2012, 30 : 774 - 781
  • [29] Security Analysis With Novel Image Masking Based Quantum-Dot Cellular Automata Information Security Model
    Debnath, Bikash
    Das, Jadav Chandra
    De, Debashis
    Mondal, Sankar Prasad
    Ahmadian, Ali
    Salimi, Mehdi
    Ferrara, Massimiliano
    IEEE ACCESS, 2020, 8 : 117159 - 117172
  • [30] An Intelligent Security Framework Based on Collaborative Mutual Authentication Model for Smart City Networks
    Khadidos, Alaa O.
    Shitharth, S.
    Manoharan, Hariprasath
    Yafoz, Ayman
    Khadidos, Adil O.
    Alyoubi, Khaled H.
    IEEE ACCESS, 2022, 10 : 85289 - 85304