Methodology for evaluating information security countermeasures of a system

Takaaki Shigematsu, Bin Hui Chou, Yoshiaki Hori, Kouichi Sakurai

研究成果: Chapter in Book/Report/Conference proceedingConference contribution

1 被引用数 (Scopus)

抄録

For leveraging the security level of the systems, it is required to develop an effective and practical methodology for evaluating the adequacy of the designed and/or implemented security countermeasures for a system. We propose a model as a one of the methodologies for evaluating security countermeasures which does not depend on the characteristics of a target system shown by the supporting businesses or the system configuration or the scale. This model consists of required security countermeasures that are well arranged for easy implementing, and required technologies and activities for achieving a target level for every required countermeasures.

本文言語英語
ホスト出版物のタイトルProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
ページ433-438
ページ数6
DOI
出版ステータス出版済み - 2008
イベント2nd International Conference on Information Security and Assurance, ISA 2008 - Busan, 大韓民国
継続期間: 4 24 20084 26 2008

その他

その他2nd International Conference on Information Security and Assurance, ISA 2008
国/地域大韓民国
CityBusan
Period4/24/084/26/08

All Science Journal Classification (ASJC) codes

  • コンピュータ ネットワークおよび通信
  • 情報システムおよび情報管理
  • 電子工学および電気工学
  • 通信

フィンガープリント

「Methodology for evaluating information security countermeasures of a system」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル