How Secure is Our Information Infrastructure?

Managers of critical information infrastructures need better tools for managing risk than the qualitative or compliance-based metrics commonly used today in critical infrastructure protection. This paper provides a performance-based metric that can be used to obtain a quantitative measure of the sec...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:Journal of Information Warfare. - Peregrine Technical Solutions. - 15(2016), 3, Seite 24-34
1. Verfasser: Ryan, JJCH (VerfasserIn)
Weitere Verfasser: Ryan, DJ
Format: Online-Aufsatz
Sprache:English
Veröffentlicht: 2016
Zugriff auf das übergeordnete Werk:Journal of Information Warfare
Schlagworte:Risk Management Information Security Security and Protection Applied sciences Information science Political science Behavioral sciences Mathematics Economics Social sciences
LEADER 01000caa a22002652 4500
001 JST123483360
003 DE-627
005 20240625065629.0
007 cr uuu---uuuuu
008 181201s2016 xx |||||o 00| ||eng c
035 |a (DE-627)JST123483360 
035 |a (JST)26502741 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
100 1 |a Ryan, JJCH  |e verfasserin  |4 aut 
245 1 0 |a How Secure is Our Information Infrastructure? 
264 1 |c 2016 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Managers of critical information infrastructures need better tools for managing risk than the qualitative or compliance-based metrics commonly used today in critical infrastructure protection. This paper provides a performance-based metric that can be used to obtain a quantitative measure of the security of information infrastructures. The metric can be used to compare the security status of different information infrastructures, or to track the evolution of security within a single infrastructure. Since, as all managers know, ‘If you can’t measure it, you can’t manage it’, the methodology presented here will improve managers’ ability to successfully protect critical information infrastructures. 
540 |a © Copyright 2016 
650 4 |a Risk Management 
650 4 |a Information Security 
650 4 |a Security and Protection 
650 4 |a Applied sciences  |x Technology  |x Communications technology  |x Communication systems  |x Digital communication systems  |x Internet  |x Information infrastructure 
650 4 |a Information science  |x Information management  |x Data management  |x Data architecture  |x Data security 
650 4 |a Political science  |x Military science  |x Armed conflict  |x War  |x Warfare  |x Unconventional warfare  |x Electronic warfare 
650 4 |a Behavioral sciences  |x Sociology  |x Human societies  |x Public safety  |x Accidents  |x Infrastructure failures 
650 4 |a Mathematics  |x Applied mathematics  |x Statistics  |x Applied statistics  |x Descriptive statistics  |x Statistical distributions  |x Distribution functions  |x Probability distributions  |x Continuous probability distributions  |x Density distributions  |x Reliability functions 
650 4 |a Applied sciences  |x Computer science  |x Computer engineering  |x Cybersecurity 
650 4 |a Economics  |x Economic disciplines  |x Information economics 
650 4 |a Mathematics  |x Applied mathematics  |x Statistics  |x Applied statistics  |x Inferential statistics  |x Statistical estimation  |x Estimation methods  |x Estimators  |x Kaplan Meier estimator 
650 4 |a Social sciences  |x Communications  |x Censorship 
650 4 |a Information science  |x Information management 
655 4 |a research-article 
700 1 |a Ryan, DJ  |e verfasserin  |4 aut 
773 0 8 |i Enthalten in  |t Journal of Information Warfare  |d Peregrine Technical Solutions  |g 15(2016), 3, Seite 24-34  |w (DE-627)1666608289  |w (DE-600)2973858-1  |x 14453347  |7 nnns 
773 1 8 |g volume:15  |g year:2016  |g number:3  |g pages:24-34 
856 4 0 |u https://www.jstor.org/stable/26502741  |3 Volltext 
912 |a GBV_USEFLAG_A 
912 |a SYSFLAG_A 
912 |a GBV_JST 
912 |a GBV_ILN_11 
912 |a GBV_ILN_20 
912 |a GBV_ILN_22 
912 |a GBV_ILN_24 
912 |a GBV_ILN_31 
912 |a GBV_ILN_39 
912 |a GBV_ILN_40 
912 |a GBV_ILN_60 
912 |a GBV_ILN_62 
912 |a GBV_ILN_63 
912 |a GBV_ILN_65 
912 |a GBV_ILN_70 
912 |a GBV_ILN_100 
912 |a GBV_ILN_101 
912 |a GBV_ILN_110 
912 |a GBV_ILN_285 
912 |a GBV_ILN_2001 
912 |a GBV_ILN_2003 
912 |a GBV_ILN_2005 
912 |a GBV_ILN_2006 
912 |a GBV_ILN_2008 
912 |a GBV_ILN_2009 
912 |a GBV_ILN_2010 
912 |a GBV_ILN_2014 
912 |a GBV_ILN_2015 
912 |a GBV_ILN_2018 
912 |a GBV_ILN_2020 
912 |a GBV_ILN_2021 
912 |a GBV_ILN_2026 
912 |a GBV_ILN_2027 
912 |a GBV_ILN_2044 
912 |a GBV_ILN_2050 
912 |a GBV_ILN_2056 
912 |a GBV_ILN_2057 
912 |a GBV_ILN_2061 
912 |a GBV_ILN_2107 
912 |a GBV_ILN_2470 
912 |a GBV_ILN_2949 
912 |a GBV_ILN_2950 
912 |a GBV_ILN_4012 
912 |a GBV_ILN_4035 
912 |a GBV_ILN_4037 
912 |a GBV_ILN_4046 
912 |a GBV_ILN_4112 
912 |a GBV_ILN_4242 
912 |a GBV_ILN_4251 
912 |a GBV_ILN_4305 
912 |a GBV_ILN_4307 
912 |a GBV_ILN_4323 
912 |a GBV_ILN_4325 
912 |a GBV_ILN_4335 
912 |a GBV_ILN_4346 
912 |a GBV_ILN_4393 
912 |a GBV_ILN_4700 
951 |a AR 
952 |d 15  |j 2016  |e 3  |h 24-34