DocumentCode :
3371981
Title :
Methodology for Evaluating Information Security Countermeasures of a System
Author :
Shigematsu, Takaaki ; Chou, Bin-Hui ; Hori, Yoshiaki ; Sakurai, Kouichi
Author_Institution :
Grad. Sch. of Inf. Sci. & Electr. Eng., Kyushu Univ., Fukuoka
fYear :
2008
fDate :
24-26 April 2008
Firstpage :
433
Lastpage :
438
Abstract :
For leveraging the security level of the systems, it is required to develop an effective and practical methodology for evaluating the adequacy of the designed and/or implemented security counter- measures for a system. We propose a model as a one of the methodologies for evaluating security countermeasures which does not depend on the characteristics of a target system shown by the supporting businesses or the system configuration or the scale. This model consists of required security countermeasures that are well arranged for easy implementing, and required technologies and activities for achieving a target level for every required countermeasures.
Keywords :
security of data; businesses; information security countermeasures; system configuration; Councils; Electronic commerce; Electronic countermeasures; Information science; Information security; Information systems; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security and Assurance, 2008. ISA 2008. International Conference on
Conference_Location :
Busan
Print_ISBN :
978-0-7695-3126-7
Type :
conf
DOI :
10.1109/ISA.2008.92
Filename :
4511606
Link To Document :
بازگشت