• DocumentCode
    3371981
  • Title

    Methodology for Evaluating Information Security Countermeasures of a System

  • Author

    Shigematsu, Takaaki ; Chou, Bin-Hui ; Hori, Yoshiaki ; Sakurai, Kouichi

  • Author_Institution
    Grad. Sch. of Inf. Sci. & Electr. Eng., Kyushu Univ., Fukuoka
  • fYear
    2008
  • fDate
    24-26 April 2008
  • Firstpage
    433
  • Lastpage
    438
  • Abstract
    For leveraging the security level of the systems, it is required to develop an effective and practical methodology for evaluating the adequacy of the designed and/or implemented security counter- measures for a system. We propose a model as a one of the methodologies for evaluating security countermeasures which does not depend on the characteristics of a target system shown by the supporting businesses or the system configuration or the scale. This model consists of required security countermeasures that are well arranged for easy implementing, and required technologies and activities for achieving a target level for every required countermeasures.
  • Keywords
    security of data; businesses; information security countermeasures; system configuration; Councils; Electronic commerce; Electronic countermeasures; Information science; Information security; Information systems; Protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security and Assurance, 2008. ISA 2008. International Conference on
  • Conference_Location
    Busan
  • Print_ISBN
    978-0-7695-3126-7
  • Type

    conf

  • DOI
    10.1109/ISA.2008.92
  • Filename
    4511606