Security Metrics and Evaluation of Information Systems Security

نویسندگان

  • Job Asheri Chaula
  • Louise Yngström
  • Stewart Kowalski
چکیده

The evaluation of information systems security is a process in which the evidence for assurance is identified, gathered, and analysed against criteria for security functionality and assurance level. This can result in a measure of trust that indicates how well the system meets particular security target. However, as the information systems complexity increases, it becomes increasingly hard to address security targets and the concept of perfect security proves to be unachievable goal for computer systems developer, testers and users. In this paper a framework for developing security requirements of information systems is examined. In this process qualitative metrics are used to yield quantifiable information that can be used to improve the evaluation process especially risk assessment, vulnerability assessment, protection profiles, and test coverage which are important aspects of systems specification. This work is based on the Common Criteria (CC) and the Systems Security Engineering Capability maturity Model (SSE-CMM). These are useful established methods for security functions identification, assurance levels classification and security processes and organisations maturity levels classification. The security requirements are developed based on security functionality of the system and policy. In this research other aspects of systems security are taken into account. These include ethics and social aspects. In all aspects security metrics facilitate improved understanding of various security process, performance, and informed decision making of various security mechanisms and procedures implementation. Moreover, security metrics are useful for indication and determination of critical and non-critical security parameters, measuring test coverage and effort direction when evaluating a system and security processes. In this research it is expected that the out put will be a system specification framework that takes into account not only the technical aspect but which includes the social and technical issues. Systems specification in CC is referred to as Protection Profiles (PPs). This study is conducted in the developing world and x.509 certificates using application will be used as case study.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

امنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور

Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...

متن کامل

Information Security Evaluation based on Requirements, Metrics and Evidence Information

Information security assurance and evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed in this field. Unfortunately, there is no practical approach to carrying out security evaluation in a systematic way. We introduce an iterative process for security evaluation based on security requiremen...

متن کامل

Usability evaluation of the user interface in electronic prescribing systems of Iran Health Insurance Organization and Social Security Organization

Introduction: The e-prescribing system is one of the basic technologies in the health system structure which was developed with the aim of properly managing healthcare resources and services, preventing common manual prescribing errors, and increasing patient safety. Given that the user interface of e-prescribing system is considered as the main factor of user acceptance, the purpose of the pre...

متن کامل

On the design and security of a lattice-based threshold secret sharing scheme

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

متن کامل

Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry

Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004