International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 104

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014


Enterprise Software Management Systems by Using Security Metrics

Bhanudas S. Panchabhai, A. N. Patil


Abstract: Metrics are quantifiable measurement. Security metrics are quantitative indicators for the security attributes of an information system or technology. Metrics helps us to understand quality and consistency. Metrics provides a universal way to exchange ideas, to measure the product or service quality, and to improve a process. We cannot improve security if we cannot measure it. This applies to security as well. Security metrics are assuming tremendous importance as they are dynamic for measuring the current security status, to develop operational best practices and for managing future security research. This topic is very applicable at a time when organizations are coming under increasing pressure requiring them to demonstrate due persistence when protecting the data assets of themselves and their users. In these situations metrics (CVSS) can give the organizations a way to prioritize vulnerabilities and the risks they pose to enterprise information assets. This paper presents a framework for ranking vulnerabilities in a consistent fashion, and some operational metrics used by large enterprises in managing their software systems security process and to cover all dimensions of IT security from organizational (people), technical and operational points of view.


Keywords: Common Vulnerability Scoring System, Vulnerabilities, Security Metrics, System Security, Security Management


Edition: Volume 3 Issue 10, October 2014,


Pages: 1536 - 1540


How to Cite this Article?

Bhanudas S. Panchabhai, A. N. Patil, "Enterprise Software Management Systems by Using Security Metrics", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=OCT14391, Volume 3 Issue 10, October 2014, 1536 - 1540

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Vulnerabilities'

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Downloads: 5

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 613 - 616

Categorize & Compare Cloud Automation & Devops Tools

Pardeep Singh Virdi

Share this Article

Similar Articles with Keyword 'System Security'

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1625 - 1630

Survey on Security and Privacy Aware Location Based Service System

Sneha Sonwane, D. A. Phalke

Share this Article

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3033 - 3035

A Survey on Security and Privacy Based Location Based Recompense Scheme

Prema. S. Patil Wankhede, M. K Kodmelwar

Share this Article

Similar Articles with Keyword 'Security Management'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2386 - 2390

GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS

Santosh S. Doifode, D. C. Mehetre

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2526 - 2529

A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It

Rohini Divase, S. N. Kini

Share this Article

Similar Articles with Keyword 'Common'

Downloads: 115 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this Article

Similar Articles with Keyword 'Vulnerability'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 38 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Similar Articles with Keyword 'Scoring'

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2031 - 2034

An Appropriate Mining Framework for Customer Knowledge Analysis

Sk. Ismail, Dasari. Rajesh

Share this Article

Downloads: 111

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 174 - 176

Keyword Query Routing using Relationship Graph

Chaitali S. Chaudhari, M. M. Naoghare

Share this Article

Similar Articles with Keyword 'System'

Downloads: 175 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article
Top