25. ASSESSMENT OF THE USEFULNESS OF THE SECURITY CONFIGURATION
The article outlines a method of assessment of the usefulness of the security configuration1 (SC) from a set of available security configurations, after occurrence of an emergency situation. It is believed that the best security configuration is the one that not only ensures maintenance of the required security level of the information resources, but also provides the best values describing its utility properties. The values de-scribing the utility properties of the security configuration and partial criteria for measuring their utility were proposed. The utility measures of the security configuration include performance, reliability and se-curity indicators.
Listing Details
- AuthorMaciej Kiedrowicz et al.
- AffiliationMilitary University of Technology Warsaw
- File
Map
Listings