Engineering Information Assurance for Critical Infrastructures: The DITSCAP Automation Study

نویسندگان

  • Seok Won Lee
  • Gail-Joon Ahn
  • Robin A. Gandhi
چکیده

Recent advances in information technology have transformed the way in which mission-critical services get delivered and are evaluated today. These services are heavily and increasingly relying on an interdependent crossed network of critical information infrastructures, spanning from private to government sectors. In order to enable such infrastructures to efficiently mitigate risks, optimize their security posture and evaluate their information assurance (IA) practices, we identify the need for a structured and comprehensive methodology for IA-aware critical infrastructure protection. In this paper, we focus on the automation study of the Department of Defense Information Technology Security Certification and Accreditation Process (DITSCAP) that is a standard for certifying and accrediting the information networks that comprise of the Defense Information Infrastructure (DII). We attempt to generalize a course of actions in DITSCAP that motivate our design principles and modeling techniques, supported by their theoretical backgrounds and demonstrable prototype interfaces to establish their appropriateness.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Active Automation of the DITSCAP

The Defense Information Infrastructure (DII) connects Department of Defense (DoD) mission support, command and control, and intelligence computers and users through voice, data, imagery, video, and multimedia services, and provides information processing and value-added services. For such a critical infrastructure to effectively mitigate risk, optimize its security posture and evaluate its info...

متن کامل

Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance

The process of engineering software-intensive systems that comply with their Certification and Accreditation (C&A) requirements involves many critical decision-making activities for the related stakeholders. Considering the exhaustive nature of C&A activities together with the complexity of software-intensive systems, effective decision making relies heavily on the ways to understand and struct...

متن کامل

Harmonizing and Uniting the Key Technical Disciplines for Risk Management of Cyber Security

This paper addresses the need to bridge the cultural, educational, and technical divides that are impeding professionals and organizations engaged in system and software development and associated security problems. In particular, harmonizing and uniting several key technical disciplines (software engineering, computer science, systems engineering) are critical for a sustainable risk management...

متن کامل

Information Assurance

1.1 INTRODUCTION Recent advances in computer networks and information technology (IT) and the advent and growth of the Internet have created unprecedented levels of opportunities for the connectivity and interaction of information systems at a global level. This has provided significant new possibilities for advancing knowledge and societal interactions across the spectrum of human endeavors , ...

متن کامل

What Are the Future Challenges of Software Technology ?

This article presents the results of one study to measure the degree to which best practice adoption is used in existing defense acquisitions. Achieving CMMI Level 5 Improvements with MBASE and the CeBASE Method When the spiral model and MBASE are combined with the Experience Factory, the result is the unified Center for Empirically Based Software Engineering method. To protect against cyberatt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005