Javascript must be enabled to continue!
Evaluation, Security
View through CrossRef
Abstract
Security evaluation
is a broad term that encompasses diverse subjects, from product and system certification to an organization's operational security risk (Summers, 1997). Four common types of security evaluations are 1. Security evaluations of products and systems against evaluation criteria (standards); 2. Information systems audits; 3. Vulnerability evaluations; 4. Information security risk evaluations, there four types are the subjects of this article.
Standards define criteria to help assure users and stakeholders that a product or system provides a defined level of security. Security evaluations against these criteria help ensure that products and systems meet their information technology security objectives and requirements.
The other three types of evaluation—information systems audits, vulnerability evaluations, and information security risk evaluations—take into account the operational environment of organizations that use information technology. These evaluations focus on how organizations use information technology products and systems in their day‐to‐day operations.
Information systems auditing is an independent appraisal of an organization's internal controls to assure management, regulatory authorities, and company shareholders that information is accurate and valid.
Vulnerability and risk evaluations are performed by information security specialists and are often driven by an organization's management as part of a security improvement initiative. A vulnerability evaluation examines organizational policies and procedures, administrative controls, internal controls, implementation of technology, and physical layout for weaknesses.
An information security risk evaluation also focuses on an organization's operational environment by examining organizational policies and practices as well as the installed technology base to identify risks to an organization's important information assets. As information security risk evaluation focuses on the following three items: an organization's important assets, the threats to the assets, and the vulnerabilities that expose the asset to the threats. Thus, a vulnerability evaluation is a subset of an information security risk evaluation.
Title: Evaluation, Security
Description:
Abstract
Security evaluation
is a broad term that encompasses diverse subjects, from product and system certification to an organization's operational security risk (Summers, 1997).
Four common types of security evaluations are 1.
Security evaluations of products and systems against evaluation criteria (standards); 2.
Information systems audits; 3.
Vulnerability evaluations; 4.
Information security risk evaluations, there four types are the subjects of this article.
Standards define criteria to help assure users and stakeholders that a product or system provides a defined level of security.
Security evaluations against these criteria help ensure that products and systems meet their information technology security objectives and requirements.
The other three types of evaluation—information systems audits, vulnerability evaluations, and information security risk evaluations—take into account the operational environment of organizations that use information technology.
These evaluations focus on how organizations use information technology products and systems in their day‐to‐day operations.
Information systems auditing is an independent appraisal of an organization's internal controls to assure management, regulatory authorities, and company shareholders that information is accurate and valid.
Vulnerability and risk evaluations are performed by information security specialists and are often driven by an organization's management as part of a security improvement initiative.
A vulnerability evaluation examines organizational policies and procedures, administrative controls, internal controls, implementation of technology, and physical layout for weaknesses.
An information security risk evaluation also focuses on an organization's operational environment by examining organizational policies and practices as well as the installed technology base to identify risks to an organization's important information assets.
As information security risk evaluation focuses on the following three items: an organization's important assets, the threats to the assets, and the vulnerabilities that expose the asset to the threats.
Thus, a vulnerability evaluation is a subset of an information security risk evaluation.
Related Results
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Abstract
As part of PETRONAS approach to sustainability, the organization has made more concerted effort to purposefully adopt Circular Economy (CE) across PETRONAS ...
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
Security requirements are important to increase the confidence of mobile users to perform many online transactions, such as banking, booking and payment via mobile devices. Object...
Evaluation Methods of Financial Security of Municipalities
Evaluation Methods of Financial Security of Municipalities
Subject / topic. Financial security of the state consists of many constituent elements and can be divided into federal, regional and local levels, each of which conditions financia...
Cash‐based approaches in humanitarian emergencies: a systematic review
Cash‐based approaches in humanitarian emergencies: a systematic review
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studi...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
National security and public administration
National security and public administration
The article deals with the problem of national security in the contemporary world which is greatly influenced by the process of globalization and digitalization. The paper highligh...
Vietnam’s Marine Environmental Security: Cross-Border Challenges and Vietnam concept
Vietnam’s Marine Environmental Security: Cross-Border Challenges and Vietnam concept
Background and objective: Since beginning of the 21st century, security in the South China Sea/East Vietnam Sea has emerged as a big problem with degraded maritime environment and ...

