Security Metrics

737 Words2 Pages

Security is a term used in almost every IT field and its usually put in place to help prevent the computer systems or computer networks from computer viruses or hackers. Security can be classified as strong or weak depending on the ease that a virus or a hacker has access to the resources available in the computer system or network. Even more, several security metrics are put in place to help ensure that the level of security which a system has is stronger. The purpose of this paper is to provide a discussion of the several commonly used metrics in the area of security while including their definitions. The security metrics are designed to provide certain functionalities such as vulnerability prevention, information gathering, and vulnerability …show more content…

This metric is designed to be reliable when it comes to the back end and it can be used easily and directly with other programs as well as scripts. This metric is considered to be good at debugging networks and exploring tools since it comes up with several connections (Bambauer et al.). Nevertheless, the tripwire is the fifth type of security metric which is associated to high expenses with its use. This metric is defined as a tool which assists the users as well as system administrators in the act of monitoring and delivering a designed file set for any relevant changes, tripwire metric is always used with system files regularly and it notifies the system administrators in the cases where there are tampered files or corrupt files so that damage control measures can be taken early before the situation worsens. Finally, the L0pht Crack is also a security metric defined as an NT tool which edits passwords. This metric computes the NT user password which is normally stored by the operating system of the NT. L0phcrack has the capability of obtaining the hashes through several sources stored by the several sources such as the registry. In addition, this metric also has ways of generating password guesses for example through the use of brute force

Open Document