首页> 外文会议>International Conference on Information Technology - New Generations >Model Based Evaluation of Cybersecurity Implementations
【24h】

Model Based Evaluation of Cybersecurity Implementations

机译:基于模型的网络安全实现评估

获取原文

摘要

Evaluation of Cybersecurity implementations is an important issue that is increasingly being considered in the agenda of organisations. We present here a model for the evaluation of Cybersecurity requirements. We start by establishing a set of security requirements in the form of a hierarchical structure to obtain a requirement tree, as it is prescribed by the Logic Score of Preference (LSP) evaluation method. Security requirements have been taken from the ISO/IEC 27002 standard. This requirement tree and an aggregation structure, built into a later step, form our Cybersecurity evaluation model, which allows to obtain a numerical final result for each system under evaluation. These final indicators, ranging into the interval 0..100, clearly show the degree of compliance of the systems under evaluation with respect to the desired requisites.
机译:网络安全实施评估是在组织议程中越来越多地考虑的重要问题。我们在这里展示了一个评估网络安全要求的型号。我们首先以分层结构的形式建立一组安全要求,以获得要求树,因为它由偏好(LSP)评估方法的逻辑分数规定。安全要求已从ISO / IEC 27002标准中取出。该要求树和聚合结构内置于稍后的步骤中,形成了我们的网络安全评估模型,这允许在评估下获得每个系统的数值最终结果。这些最终指标,范围为0..100,清楚地显示了对所需必要条件的评估中的系统的依从性程度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号