Loading…

A Method for Calculating Efficiency Indicators of Information Security Systems

Background: As information and communication systems become more sophisticated and linked, there is an increasing demand for adequate information security and cybersecurity measures. The modern age necessitates a methodical approach to evaluating and fortifying these systems against emerging cyber t...

Full description

Saved in:
Bibliographic Details
Main Authors: Kozubtsov, Ihor, Silko, Oleksii, Kozubtsova, Lesia, Abu-AlShaeer, Mahmood Jawad, Ismail, Laith S., Jassim, Mustafa Mohammmed
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Background: As information and communication systems become more sophisticated and linked, there is an increasing demand for adequate information security and cybersecurity measures. The modern age necessitates a methodical approach to evaluating and fortifying these systems against emerging cyber threats. Objective: This study provides a unique technique for assessing the effectiveness of information security and cybersecurity solutions. The technique tries to discover and correct possible vulnerabilities by examining individual indications, providing enterprises with a data-centric strategy to enhance their cyber defenses. Methods: The approach uses a large dataset from many firms and industries. To illustrate critical security components, key performance indicators (KPIs) such as incident response time, threat detection rates, and vulnerability repair were chosen. Advanced statistical approaches and machine learning algorithms were used to evaluate the effectiveness of these systems against set KPI criteria. Results: The current study yields significant insights into the strengths and limitations of various security techniques. By evaluating specific indicators, opportunities for improvement were found, allowing firms to focus their security operations more effectively. The study validated the influence of system complexity and security investment on overall system efficiency. Conclusion: This article proposes a data-driven strategy to improve the efficiency of information and cybersecurity systems, providing companies with a road map for protecting their essential assets and data in the face of an ever-changing cyber threat scenario.
ISSN:2305-7254
2305-7254
2343-0737
DOI:10.23919/FRUCT61870.2024.10516412