Enterprise Software Management Systems by Using Security Metrics
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 137 , Downloads: 103 | CTR: 75 % | Weekly Popularity: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014

Enterprise Software Management Systems by Using Security Metrics

Bhanudas S. Panchabhai, A. N. Patil

Metrics are quantifiable measurement. Security metrics are quantitative indicators for the security attributes of an information system or technology. Metrics helps us to understand quality and consistency. Metrics provides a universal way to exchange ideas, to measure the product or service quality, and to improve a process. We cannot improve security if we cannot measure it. This applies to security as well. Security metrics are assuming tremendous importance as they are dynamic for measuring the current security status, to develop operational best practices and for managing future security research. This topic is very applicable at a time when organizations are coming under increasing pressure requiring them to demonstrate due persistence when protecting the data assets of themselves and their users. In these situations metrics (CVSS) can give the organizations a way to prioritize vulnerabilities and the risks they pose to enterprise information assets. This paper presents a framework for ranking vulnerabilities in a consistent fashion, and some operational metrics used by large enterprises in managing their software systems security process and to cover all dimensions of IT security from organizational (people), technical and operational points of view.

Keywords: Common Vulnerability Scoring System, Vulnerabilities, Security Metrics, System Security, Security Management

Edition: Volume 3 Issue 10, October 2014

Pages: 1536 - 1540

Share this Article

How to Cite this Article?

Bhanudas S. Panchabhai, A. N. Patil, "Enterprise Software Management Systems by Using Security Metrics", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14391, Volume 3 Issue 10, October 2014, 1536 - 1540

137 PDF Views | 103 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Vulnerabilities'

Views: 30 , Downloads: 25 | CTR: 83 % | Weekly Popularity: ⮙18

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 165 , Downloads: 91 | CTR: 55 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Views: 160 , Downloads: 100 | CTR: 63 % | Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Views: 144 , Downloads: 102 | CTR: 71 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Similar Articles with Keyword 'Security Metrics'

Views: 145 , Downloads: 100 | CTR: 69 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2038 - 2044

Fragmentation and Duplication of Data for the Best Cloud Performance and Security (FDBPS)

Prof. Jaya Kumar B L, Saranya C

Share this Article

Views: 137 , Downloads: 103 | CTR: 75 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1536 - 1540

Enterprise Software Management Systems by Using Security Metrics

Bhanudas S. Panchabhai, A. N. Patil

Share this Article

Similar Articles with Keyword 'System Security'

Views: 137 , Downloads: 103 | CTR: 75 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1536 - 1540

Enterprise Software Management Systems by Using Security Metrics

Bhanudas S. Panchabhai, A. N. Patil

Share this Article

Views: 129 , Downloads: 103 | CTR: 80 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1625 - 1630

Survey on Security and Privacy Aware Location Based Service System

Sneha Sonwane, D. A. Phalke

Share this Article

Views: 144 , Downloads: 104 | CTR: 72 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3033 - 3035

A Survey on Security and Privacy Based Location Based Recompense Scheme

Prema. S. Patil Wankhede, M. K Kodmelwar

Share this Article

Views: 131 , Downloads: 105 | CTR: 80 % | Weekly Popularity: ⮙1

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this Article

Views: 135 , Downloads: 107 | CTR: 79 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1727 - 1731

Design of Secure, Reliable and Lightweight Communication in Trusted Wireless Sensor Network

Pradnya S. Kulkarni, Dr. Aarti Dixit

Share this Article

Similar Articles with Keyword 'Security Management'

Views: 125 , Downloads: 101 | CTR: 81 %

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2526 - 2529

A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It

Rohini Divase, S. N. Kini

Share this Article

Views: 137 , Downloads: 103 | CTR: 75 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1536 - 1540

Enterprise Software Management Systems by Using Security Metrics

Bhanudas S. Panchabhai, A. N. Patil

Share this Article

Views: 131 , Downloads: 103 | CTR: 79 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2386 - 2390

GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS

Santosh S. Doifode, D. C. Mehetre

Share this Article

Views: 136 , Downloads: 111 | CTR: 82 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, Sudan, Volume 4 Issue 4, April 2015

Pages: 742 - 748

Assembly Classifier Approach to Analyze Intrusion Detection Dataset in Networks by Using Data Mining Techniques

Ayad Mohammed Mahyoub Ghaleb, Samani A. Talab

Share this Article

Views: 156 , Downloads: 120 | CTR: 77 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1893 - 1896

A Study on Critical Capabilities for Security Information and Event Management

Kavita Agrawal, Hemant Makwana

Share this Article
Top