• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site

Book

Contributions to ASSE 2013. Proceedings of ASSE 2013 Argentine Symposium on Software Engineering

Córdoba: 2013.
Leading author: L. A. Alemany, C. Areces.

An IT security vulnerability can be considered as an inherent weakness in a target system that could be exploited by a threat source. The underlying hypothesis in our proposal is that each identified attribute associated with the target entity to be controlled should show the highest quality satisfaction level as an elementary indicator. The higher the quality indicator value achieved per each attribute, the lower the vulnerability indicator value and therefore the potential impact from the risk standpoint. In the present work, we discuss the added value of supporting the IT security and risk assessment areas with measurement and evaluation (M&E) methods and strategy, which are based on metrics and indicators. Also we illustrate excerpts of an M&E case study for characteristics and attributes of Security, and their potential risk assessment.

Chapters
Contributions to ASSE 2013. Proceedings of ASSE 2013 Argentine Symposium on Software Engineering