2008
DOI: 10.1002/j.2334-5837.2008.tb00838.x
|View full text |Cite
|
Sign up to set email alerts
|

6.3.1 Secure Adaptive Response Potential (SARP): A System Security Metric

Abstract: Abstract. System design, development and operational activities are monitored and evaluated to facilitate proper system security management in all phases of the system life-cycle. Effective system security metrics must address all phases of the system life-cycle as well as the associated organizational elements that interact during the system life-cycle to produce and operate the system of interest. A single system security metric, built from multiple components, is presented here as a fundamental system manag… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2010
2010

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…The output from a SSCAM activity could be used as input to a structured evaluation technique that evaluates the most effective methods to address any indicated security short falls found in the SSCAM QL or SSCAM process assessments. The secure adaptive response potential (SARP) metric was developed to directly support this type of management decision making (Simpson 2008).…”
Section: Sscam Applicationmentioning
confidence: 99%
“…The output from a SSCAM activity could be used as input to a structured evaluation technique that evaluates the most effective methods to address any indicated security short falls found in the SSCAM QL or SSCAM process assessments. The secure adaptive response potential (SARP) metric was developed to directly support this type of management decision making (Simpson 2008).…”
Section: Sscam Applicationmentioning
confidence: 99%
“…The Microsoft Security Development Lifecycle process is an example of this type of stand-alone security life-cycle process. (Simpson, Miller, & Dagli, 2008). SARP can be used to guide programmatic decision and resource allocation.…”
Section: Information Asset Protection Modelmentioning
confidence: 99%
“…Step 8: Prioritize requirements The complete system scope as well as the attention to value, threat and function in the APM support the activity of requirements prioritization. The structured information and data associated with the APM can be used as direct inputs for formal ranking tools like the analytical hierarchy process (AHP) (Simpson, Miller, & Dagli, June, 2008).…”
Section: Table 1 Apm Contextual Support For Square Process Square Pro...mentioning
confidence: 99%
See 2 more Smart Citations