International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 104

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014


Enterprise Software Management Systems by Using Security Metrics

Bhanudas S. Panchabhai | A. N. Patil


Abstract: Metrics are quantifiable measurement. Security metrics are quantitative indicators for the security attributes of an information system or technology. Metrics helps us to understand quality and consistency. Metrics provides a universal way to exchange ideas, to measure the product or service quality, and to improve a process. We cannot improve security if we cannot measure it. This applies to security as well. Security metrics are assuming tremendous importance as they are dynamic for measuring the current security status, to develop operational best practices and for managing future security research. This topic is very applicable at a time when organizations are coming under increasing pressure requiring them to demonstrate due persistence when protecting the data assets of themselves and their users. In these situations metrics (CVSS) can give the organizations a way to prioritize vulnerabilities and the risks they pose to enterprise information assets. This paper presents a framework for ranking vulnerabilities in a consistent fashion, and some operational metrics used by large enterprises in managing their software systems security process and to cover all dimensions of IT security from organizational (people), technical and operational points of view.


Keywords: Common Vulnerability Scoring System, Vulnerabilities, Security Metrics, System Security, Security Management


Edition: Volume 3 Issue 10, October 2014,


Pages: 1536 - 1540


How to Cite this Article?

Bhanudas S. Panchabhai, A. N. Patil, "Enterprise Software Management Systems by Using Security Metrics", International Journal of Science and Research (IJSR), Volume 3 Issue 10, October 2014, pp. 1536-1540, https://www.ijsr.net/get_abstract.php?paper_id=OCT14391

How to Share this Article?






Similar Articles with Keyword 'Vulnerabilities'

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth [2] | K. Venkata Ramana [2]

Share this Article

Downloads: 6

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 613 - 616

Categorize & Compare Cloud Automation & Devops Tools

Pardeep Singh Virdi

Share this Article


Top