首页> 外文会议>IEEE Network Operations and Management Symposium >Applying a Model of Configuration Complexity to Measure Security Impact on IT Procedures
【24h】

Applying a Model of Configuration Complexity to Measure Security Impact on IT Procedures

机译:应用配置复杂性模型来测量对IT程序的安全影响

获取原文

摘要

IT security has become over the recent years a major concern for organizations. However, it doesn't come without large investments on both the acquisition of tools to satisfy particular security requirements and complex procedures to deploy and maintain a protected infrastructure. The scientific community has proposed in the recent past models and techniques to measure the complexity of configuration procedures, aware that they represent a significant operational cost, often dominating total cost of ownership. However, despite the central role played by security within this context, it has not been subject to any investigation so far. To address this issue, we apply a model of configuration complexity proposed in the literature in order to be able to estimate security impact on the complexity of IT procedures. Our proposal has been materialized through a prototypical implementation of a complexity scorer system called Security Complexity Analyzer (SCA). To prove concept and technical feasibility of our proposal, we have used the SCA to evaluate real-life security scenarios.
机译:IT安全已成为近年来对组织的主要关注点。但是,在收购工具上没有大量投资,以满足特定的安全要求和部署和维护受保护基础架构的复杂程序。科学界在最近的模型和技术提出来衡量的配置过程的复杂性,认识到它们代表了显著的运营成本,往往占据了总拥有成本。然而,尽管在这方面存在安全性作用,但到目前为止,它还没有受到任何调查的约束。为了解决这个问题,我们在文献中提出的配置复杂性模型,以便能够估计对IT程序复杂性的安全影响。我们的提案通过了一个名为安全复杂性分析仪(SCA)的复杂性得分手系统的原型实施来实现。为了证明我们提案的概念和技术可行性,我们使用SCA来评估现实生活中的安全方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号