Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(105.2KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Measuring Information Security: Understanding And Selecting Appropriate Metrics
Perpétus Jacques Houngbo , Joël Toyigbé Hounsou
Pages - 108 - 120     |    Revised - 31-03-2015     |    Published - 30-04-2015
Published in International Journal of Computer Science and Security (IJCSS)
Volume - 9   Issue - 2    |    Publication Date - March / April 2015  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Information Quality, Measurement, Metric, Performance.
ABSTRACT
Thanks to numerous information in newspapers about data leaks, advocacy for information security is no more that difficult. But on the practical side, it is usually tough time for information security professionals when they have to demonstrate the value of information security to their organizations; they have so much metrics available on hand that making the right selection is far from obvious. This paper is about understanding the metrics that are available and discussing how to use them in some specific less developed economies.
ABSTRACTING & INDEXING
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 TechRepublic 
5 ResearchGATE 
6 Scribd 
7 SlideShare 
8 PdfSR 
REFERENCES
A. C. S. Associates, Information System Security Attribute Quantification or Ordering (Commonly but improperly known as “Security Metrics”). 2001.
A. Jaquith, Security metrics: replacing fear, uncertainty, and doubt. Upper Saddle River, NJ: Addison-Wesley, 2007.
A. Union, The 23rd Ordinary Session of the African Union ends in Malabo - African Union. 2014.
D. Hubbard, Measure for measure: The Actuary, official magazine of SIAS and The Actuarial Profession. 2014.
DTCC, Cyber risk - a global systemic threat. 2014.
E. Chew, M. Swanson, K. Stine, N. Bartol, A. Brown, and W. Robinson, Performance Measurement Guide for Information Security NIST Special Publication 800-55 Revision 1. 2008.
F. Cohen, “Measuring security,” 2011.
G. Hinson and K. Brotby, Getting started with security metrics. 2014.
I. S. P. Council, The Basic Policy of Critical Information Infrastructure Protection (3rd Edition). 2014.
ITU-T, -T X.1520 (01/2014) Common vulnerabilities and exposures. 2014.
J. Breier and L. Hudec, “Risk analysis supported by information security metrics,” in Proceedings of the 12th International Conference on Computer Systems and Technologies, 2011, pp. 393–398.
K.-E. Sveiby, Methods for Measuring Intangible Assets. 2010.
L. Wang, S. Jajodia, A. Singhal, P. Cheng, and S. Noel, “k-Zero day safety: A network security metric for measuring the risk of unknown vulnerabilities,” 2014.
M. Hoehl, Creating a monthly Information Security Scorecard for CIO and CFO. SANS Institute, 2010.
M. Kimwele, W. Mwangi, and S. Kimani, “Information technology (IT) security framework for Kenyan small and medium enterprises (SMEs),” Int. J. Comput. Sci. Secur. IJCSS, vol. 5, no. 1, p. 39, 2011.
M. M. Gamal, B. Hasan, and A. F. Hegazy, “A Security Analysis Framework Powered by an Expert System,” Int. J. Comput. Sci. Secur. IJCSS, vol. 4, no. 6, p. 505, 2011.
O. O. M. A. BUDGET, Annual report to congress: may 1, 2014. 2014.
O. of C. and C.- DHS, FY 2014 Chief Information Officer Federal Information Security Management Act Micro Agency Reporting Metrics v1.1. 2014.
P. E. Black, K. Scarfone, and M. Souppaya, “Cyber security metrics and measures,” Wiley Handb. Sci. Technol. Homel. Secur., 2008.
P. Institute, 2014 Cost of Cyber Crime Study: United States. 2014.
P. O. Imeokparia, K. Ediagbonya, and others, “Small and Medium Scale Enterprises (SMEs): A Catalyst in Promoting Economic Development in Nigeria,” J. Educ. Pract., vol. 5, no. 33, pp. 92–98, 2014.
PwC, Information security breaches survey 2014 - technical report. 2014.
PwC, Managing cyber risks in an interconnected world Key findings from The Global State of Information Security Survey 2015. 2014.
R. A. Martin, “Making Security Measurable and Manageable,” Nov. 2008.
R. Barabanov, S. Kowalski, and L. Yngström, “Information Security Metrics: State of the Art: State of the art,” 2011.
S. C. Payne, “A guide to security metrics,” Inst. Inf. Secur. Read. Room, 2006.
S. Noel and S. Jajodia, “Metrics Suite for Network Attack Graph Analytics,” 2014.
T. C. for I. Security, The CIS Security Metrics. 2010.
T. Kanstrén, R. Savola, A. Evesti, H. Pentikäinen, A. Hecker, M. Ouedraogo, K. Hätönen, P. Halonen, C. Blad, O. López, and others, “Towards an abstraction layer for Security Assurance measurements,” in Proceedings of the Fourth European Conference on Software Architecture: Companion Volume, 2010, pp. 189–196.
V. Mulango, “SMEs crucial for Africa Transformation Agenda.” Nov-2014.
V. Verendel, “Quantified security is a weak hypothesis: a critical survey of results and assumptions,” in Proceedings of the 2009 workshop on New security paradigms workshop, 2009, pp. 37–50.
MANUSCRIPT AUTHORS
Mr. Perpétus Jacques Houngbo
Institut de Mathématiques et de Sciences Physiques (IMSP) - Benin
jacques.houngbo@auriane-etudes.com
Dr. Joël Toyigbé Hounsou
Institut de Mathématiques et de Sciences Physiques (IMSP) Dangbo, Benin - Benin


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions