Int J Performability Eng ›› 2022, Vol. 18 ›› Issue (4): 282-288.doi: 10.23940/ijpe.22.04.p6.282288

Previous Articles     Next Articles

Efficacy and Security Effectiveness: Key Parameters in Evaluation of Network Security

S. Guru Prasada,*, M. K. Badrinarayanana, and V. Ceronmani Sharmilab   

  1. aSchool of Management, Hindustan Institute of Technology & Science, Chennai, 603103, India;
    bDepartment of Information Technology, Hindustan Institute of Technology & Science, Chennai, 603103, India
  • Submitted on ; Revised on ; Accepted on
  • Contact: * E-mail address: guru@cybertracs.in
  • About author:S. Guru Prasad is a Research Scholar of the School of Management, Hindustan Institute of Technology & Science, Chennai, India. His research interests include Cyber Security & Strategy, Information Systems Management.
    M.K. Badrinarayanan is a Professor of the School of Management at Hindustan Institute of Technology & Science, Chennai, India. His research interests include Entrepreneurship, MSMEs, Competitiveness, Strategy, Technopreneurship, Livelihoods, microfinance.
    V. Ceronmani Sharmila is a Professor of the Department of Information Technology, School of Computing Sciences at Hindustan Institute of Technology & Science, Chennai, India. Her research interests include Computer Networks, Cyber Security, Cloud Security, Image processing & IoT.

Abstract: Information is the most critical asset of modern-day organisations. Organisations use various information technology tools, products, and solutions to store the information. Because of its importance to organisations, information is protected using various information protection tools, that would include computer or network hardware and software. This article aims to give the organisations and their Chief Information Security officers a template for technical evaluation of the various network security solutions with Security effectiveness as a key element in their decision making.

Key words: network security, effective network security, network security components, template for network security evaluation, network security evaluation by CISOs