Abstract (eng)
As part of this work, a model has been developed that evaluates the IT security status of a system. Security metrics are developed based on ISO standards. In the course of this work, an overview of the ISO measurement model and of the balanced scorecard is given and modeled accordingly for the performance of the evaluation. Finally, the prototype implementation and its test complete the work.
Evaluating the security status of systems is an important issue in organizations. As a result, organizations are investing more and more in security to protect themselves against attacks by hackers or malware. For this reason, regular security analyses and security evaluations are important. In this context, assessing a company's security level requires a framework based on best practices and on standards. In this context the definition of security metrics is particularly highlighted.
In the present work, an overview of the Information Security Management System and the Plan-Do-Act-Check cycle is given. There will also be a detailed description of the Security Metrics and the Balanced Scorecard.
The objective of this thesis is to measure and evaluate the IT security status of a company with the aid of the defined security key figures. Security metrics are used to determine the status of IT security in the enterprise. In this work, metrics are developed to assess access control and search input in the system. For this purpose, a plugin is developed and implemented, which carries out the safety assessment of a system automatically. All login data and search entries are analyzed and evaluated within a certain period of time. To perform the IT security assessment, an indicator is also required. This is determined by the company. The evaluation results provide an overview of the IT security status of the system. Based on these findings, the company can decide what security measures to take to improve the system. In addition, the company can call up detailed information about user name, time and IP address. In the context of this work the model development, the prototype implementation and the test execution are explained in detail. Finally, the test results are discussed.