Fundamental Concepts of IT Security Assurance
ثبت نشده
چکیده
1 ISACA JOURNAL VOLUME 2, 2012 Government and commercial organizations rely heavily on the use of information to conduct their business activities. Loss of confidentiality, integrity, availability, accountability, authenticity and reliability of information and services can have an adverse impact on organizations. Consequently, there is a critical need to protect information and to manage the security of IT systems within organizations. Alongside significant benefits, every new technology introduces new challenges for the protection of this information. The requirement to protect information is particularly important in today’s environment because many organizations are internally and externally connected by networks of IT systems.1 IT systems are prone to failure and security violations due to errors and vulnerabilities. These errors and vulnerabilities can be caused by many factors, such as rapidly changing technology, human error, poor requirement specifications, poor development processes or underestimating the threat. In addition, system modifications, new flaws and new attacks are frequently introduced, which contributes to increased vulnerabilities, failures and security violations throughout the IT system life cycle.2 The industry came to the realization that it is almost impossible to guarantee an error-free, riskfree and secure IT system due to the imperfection of the opposing security mechanisms, human error or oversight, and component or equipment failure.3 Completely secure IT systems do not exist; only those in which the owners may have varying degrees of confidence that security needs of a system are satisfied do.4 In addition, many information systems have not been designed to be secure. The security that can be achieved through technical means is limited and should be supported by appropriate management and procedures.5 The task of IT security (ITS) engineering and management is to manage the security risk by mitigating the vulnerabilities and threats with technological and organizational security measures to achieve an IT system with acceptable assurance. ITS management has an additional task: establishing acceptable assurance and risk objectives. In this way, the stakeholders of an IT system will achieve reasonable confidence that the IT system performs in the way intended or claimed, with acceptable risk and within budget.6 ISO/IEC TR 15443 Information technology— Security techniques—A framework for IT security assurance is a multipart technical report intended to guide ITS professionals in the selection of an appropriate assurance method when specifying, selecting or deploying a security service, product or environmental factor (known as a “deliverable”).7 The objective of ISO/IEC TR 15443 is to present a variety of assurance methods and to guide the ITS professional in the selection of an appropriate assurance method (or combination of methods) to achieve confidence that a given IT system satisfies its stated ITS assurance requirements. ISO/IEC TR 15443 analyzes assurance methods that may not be unique to ITS; however, guidance given in the standard is limited to ITS requirements. This article introduces the fundamental concepts of ITS assurance based on ISO/IEC TR 15443.
منابع مشابه
Security issues for automated information systems
The growing interconnectivity of computer systems has dramatically increased the risk of exposure or corruption of information through the exploitation of system security vulnerabilities. Many aspects of organizational operations and of the national infrastructure depend upon the correct operation of computers and networks. Security is a fundamental requirement for the health of the public ente...
متن کاملA Security Effective Structure for National Defense in the 21st Century
In accordance with human necessities and deep attention into security, research studies have today became an irrefutable necessity in this area. It is noted that traditional concepts of this important issue have changed, as a result of occurring various events in the past, particularly in the 20th century; so that security is no more limited to protecting human beings against individual and col...
متن کاملA Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach
A doctoral program in computer science with a specialization in information security is described. The focus of the program is constructive security. Key elements of the program are the strong computer science core upon which it builds, coursework on the theory and principles of information assurance, and a unifying research project. The doctoral candidate is a member of the project team, whose...
متن کاملResilient Cyber Ecosystems
Cyber Mission Resilience (CMR) is a significant step in the evolution of IT security. Not only does it reduce the complexity and cost of securing today’s IT systems, it helps prioritize security-related activities. The focus on mission resilience extends the scope of past security practices while simultaneously honing in on mission-critical systems, networks, and processes. This article explore...
متن کاملInformation Assurance and Security
Information assurance contains all the elements of information security (confidentiality) but also includes elements of availability, and integrity. Information assurance provides a view of information protection that includes defensive measures in all three states — processing, storage, and transmission. To defend information and data there are three fundamental countermeasure categories: 1. t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012