Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014
Enterprise Software Management Systems by Using Security Metrics
Bhanudas S. Panchabhai, A. N. Patil
Abstract: Metrics are quantifiable measurement. Security metrics are quantitative indicators for the security attributes of an information system or technology. Metrics helps us to understand quality and consistency. Metrics provides a universal way to exchange ideas, to measure the product or service quality, and to improve a process. We cannot improve security if we cannot measure it. This applies to security as well. Security metrics are assuming tremendous importance as they are dynamic for measuring the current security status, to develop operational best practices and for managing future security research. This topic is very applicable at a time when organizations are coming under increasing pressure requiring them to demonstrate due persistence when protecting the data assets of themselves and their users. In these situations metrics (CVSS) can give the organizations a way to prioritize vulnerabilities and the risks they pose to enterprise information assets. This paper presents a framework for ranking vulnerabilities in a consistent fashion, and some operational metrics used by large enterprises in managing their software systems security process and to cover all dimensions of IT security from organizational (people), technical and operational points of view.
Keywords: Common Vulnerability Scoring System, Vulnerabilities, Security Metrics, System Security, Security Management
Edition: Volume 3 Issue 10, October 2014,
Pages: 1536 - 1540
How to Cite this Article?
Bhanudas S. Panchabhai, A. N. Patil, "Enterprise Software Management Systems by Using Security Metrics", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=OCT14391, Volume 3 Issue 10, October 2014, 1536 - 1540
How to Share this Article?
Similar Articles with Keyword 'Vulnerabilities'
Secure Methods for Supplychain Management to Protect from Attacks in Blockchain
B. Ratnakanth, K. Venkata Ramana
Categorize & Compare Cloud Automation & Devops Tools
Pardeep Singh Virdi
Similar Articles with Keyword 'System Security'
Survey on Security and Privacy Aware Location Based Service System
Sneha Sonwane, D. A. Phalke
A Survey on Security and Privacy Based Location Based Recompense Scheme
Prema. S. Patil Wankhede, M. K Kodmelwar
Similar Articles with Keyword 'Security Management'
GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS
Santosh S. Doifode, D. C. Mehetre
A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It
Rohini Divase, S. N. Kini
Similar Articles with Keyword 'Common'
A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
A Survey of Generating Multi-Document Summarizations
Patil Ajita S., P. M. Mane
Similar Articles with Keyword 'Vulnerability'
A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic
Similar Articles with Keyword 'Scoring'
An Appropriate Mining Framework for Customer Knowledge Analysis
Sk. Ismail, Dasari. Rajesh
Keyword Query Routing using Relationship Graph
Chaitali S. Chaudhari, M. M. Naoghare
Similar Articles with Keyword 'System'
Multifunctional Remote Controlled Robot Using Android Application
T. A. Mithu, T. S. Reddy
Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm
Dr. Niju P. Joseph, Dr. Priyanka Surendran