2018
DOI: 10.1051/matecconf/201821004011
|View full text |Cite
|
Sign up to set email alerts
|

Method for assessing efficiency of the information security management system

Abstract: The article addresses the issue of efficiency assessment of the security system (SS) in terms of the Information Security Management System (information resources of the information system in an organization). It is assumed that the purpose of such security system is to achieve a declared level of protection of the information system resources. Therefore, the level of security of information system in a given organization shall be determined by the efficiency assessment of the security system. The efficiency o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 4 publications
0
3
0
1
Order By: Relevance
“…However, it is also possible for routinely used documents to be of low value (e.g., temporary system files), but it is viewed to be better to overstate a document's sensitivity than under. Previous work has demonstrated the use of sensitivity levels in respect to resource security (Kiedrowicz et al 2015;Stanik 2017). Furthermore, in previous research, sensitivity levels are established based on the textual contents of documents (Park et al 2011).…”
Section: Establishing Trust and Sensitivity Valuesmentioning
confidence: 99%
“…However, it is also possible for routinely used documents to be of low value (e.g., temporary system files), but it is viewed to be better to overstate a document's sensitivity than under. Previous work has demonstrated the use of sensitivity levels in respect to resource security (Kiedrowicz et al 2015;Stanik 2017). Furthermore, in previous research, sensitivity levels are established based on the textual contents of documents (Park et al 2011).…”
Section: Establishing Trust and Sensitivity Valuesmentioning
confidence: 99%
“…Various approaches to measuring security, which can be conditionally classified as cost, functional and based on risk analysis, with appropriate methods and metrics for evaluating the asset protection, are described in [36][37][38][39][40][41].…”
Section: Related Workmentioning
confidence: 99%
“…But the implementation of these controls is not sufficient, and systems with which to manage security over time are required that will make it possible to react quickly to new risks, vulnerabilities, threats, etc. [17]. However, the security systems of most companies (and especially small and medium-sized enterprises -SMEs) have been developed without adequate guidelines, without documentation, with insufficient resources [18,19] and with a low security culture [10,20].…”
Section: Introductionmentioning
confidence: 99%