Metrics and Indicators of Information Security Incident Management: A Systematic Mapping Study

被引:2
作者
Cadena, Alyssa [1 ]
Gualoto, Franklin [1 ]
Fuertes, Walter [1 ]
Tello-Oquendo, Luis [2 ]
Andrade, Roberto [3 ]
Tapia, Freddy [1 ]
Torres, Jenny [3 ]
机构
[1] Univ Fuerzas Armadas ESPE, Sangolqui, Ecuador
[2] Univ Nacl Chimborazo, Riobamba, Ecuador
[3] Escuela Politec Nacl, Quito, Ecuador
来源
DEVELOPMENTS AND ADVANCES IN DEFENSE AND SECURITY | 2020年 / 152卷
关键词
Security incidents; Metrics; Indicators; Security incident management; Key performance indicators; Empirical study;
D O I
10.1007/978-981-13-9155-2_40
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The number of threats and vulnerabilities has increased rapidly in recent years. For this reason, organizations are in need of providing improvements in their computer security incident management (CSIM), in order to safeguard their intellectual capital. Therefore, the identification and use of both metrics and indicators are a crucial factor to manage security incidents. In this context, organizations try to improve their level of CSIM based on standards or only according to their criteria based on their experience. This article aims at carrying out a systematic mapping study of academic articles conducted in this research area, in order to present a document that describes metrics and indicators of security incidents in organizations. The results of this work show and describe several key indicators and metrics related to the cost, quality, and service (time) involved in dealing with such incidents. Also, it is expected that this study serves as a strategic reference for organizations.
引用
收藏
页码:507 / 519
页数:13
相关论文
共 26 条
  • [1] [Anonymous], 270042009 ISOIEC
  • [2] ANSI/ISA, 2009, TECH REP
  • [3] ANSI/ISA, 2007, TECH REP
  • [4] Forewarned is Forearmed: Indicators for Evaluating Information Security Incident Management
    Bernsmed, Karin
    Tondel, Inger Anne
    [J]. 2013 SEVENTH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT AND IT FORENSICS (IMF 2013), 2013, : 3 - 14
  • [5] A comprehensive survey on machine learning for networking: evolution, applications and research opportunities
    Boutaba, Raouf
    Salahuddin, Mohammad A.
    Limam, Noura
    Ayoubi, Sara
    Shahriar, Nashid
    Estrada-Solano, Felipe
    Caicedo, Oscar M.
    [J]. JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2018, 9 (09)
  • [6] Bustamante F., 2017, 2017 IEEE 24 INT C E, P1
  • [7] Chew E., 2008, NIST SPECIAL PUBLICA, P8930
  • [8] Cichonski P., 2012, NIST SPEC PUBL, V800, P1
  • [9] A systematic mapping study on the combination of static and dynamic quality assurance techniques
    Elberzhager, Frank
    Munch, Jurgen
    Vi Tran Ngoc Nha
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2012, 54 (01) : 1 - 15
  • [10] Hajdarevic K, 2013, 2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1121