Skip to main content

An Algorithm Design to Evaluate the Security Level of an Information System

  • Conference paper
Computer Networks and Information Technologies (CNC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 142))

Abstract

Measuring the security of an Information System has become a critical issue in the era of Information Technology. As any other process, security can not be improved, if it can not be measured. The need of security metrics is important for assessing the current security status. Since all systems and organizations are different, there is no single set of metrics that is generally applicable. This paper presents an algorithm to develop the necessary security metrics for assessing the information system in a structured way and a quantitative evaluation model with qualitative decision based on Analytic Hierarchy Process (AHP) to measure the security level of the Information System. At last, a test case is given to illustrate the algorithm and effectiveness of this model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Savola, R.: A Security Metrics Development Method for Software Intensive Systems. In: ISA 2009. CCIS, vol. 36, pp. 11–16. Springer, Heidelberg (2009)

    Google Scholar 

  2. Parker, D.B.: Computer Security Management. Reston Publishing Company, Reston (1981)

    Google Scholar 

  3. Roberts, F.: Measurement Theory, with Applications to Decision-Making, Utility, and the Social Sciences. Addison-Wesley, Reading (1979)

    Google Scholar 

  4. Swanson M., Nadya B., Sabato J., Hash J., Graffo L.: Security Metrics Guide for Information Technology Systems, National Institute of Standards and Technology Special Publication #800-26NIST 800-55 (2003)

    Google Scholar 

  5. Saaty, T.: The Analytic Hierarchy Process. McGraw-Hill, New York (1980)

    MATH  Google Scholar 

  6. Wang, C., Wulf, W.A.: Towards a Framework for Security Measurement. In: 20th National Information Systems Security Conference, Baltimore, MD, USA, pp. 522–533 (October 1997)

    Google Scholar 

  7. Hallberg, J., Hunstad, A., Peterson, M.: A Framework for System Security Assessment. In: Proceedings of Sixth Annual IEEE SMC Information Assurance Workshop, IAW 2005, 224–231 (2005)

    Google Scholar 

  8. Vaughn Jr., R.B., Henning, R., Siraj, A.: Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy. In: 36th Annual Hawaii International Conference on System Sciences Proceedings, p. 10 (2003)

    Google Scholar 

  9. WISSRR Workshop Proceedings, Security System Scoring and Ranking, ACSA (May 2001)

    Google Scholar 

  10. ISO27002: The ISO 27001 and ISO 27002 Directory, http://www.27002.net

  11. Introduction to ISO 27002 / ISO27002, http://www.27000.org/iso-27002.htm

  12. Introduction to ISO 27004 / ISO27004, http://www.27000.org/iso-27004.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Thalia, S., Tuteja, A., Dutta, M. (2011). An Algorithm Design to Evaluate the Security Level of an Information System. In: Das, V.V., Stephen, J., Chaba, Y. (eds) Computer Networks and Information Technologies. CNC 2011. Communications in Computer and Information Science, vol 142. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19542-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19542-6_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19541-9

  • Online ISBN: 978-3-642-19542-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics