Abstract
A prerequisite to implement effective and efficient Information Systems security measures is to have a clear understanding of both, the business that the system will support and the importance of the system in the operating environment. Similarly, the evaluation of one’s confidence in the deployed safeguarding measures, to adequately protect system assets, requires a better understanding of the security criticality of the system within its context of use (i.e. where is the system used and what for?). This paper proposes metrics as well as a methodology for the evaluation of operational systems security assurance. A critical feature of our approach is that assurance level is dependent on the measurement of security correctness and system security criticality. To that extend, we also propose a novel classification scheme for Information Systems based on their security criticality. Our work is illustrated with an application based on the case study of a Domain Name Server (DNS).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Le Grand, C.H.: Software security assurance: A framework for software vulnerability management and audit. CHL Global Associates and Ounce Labs, Inc. (2005)
Jansen, W.: Directions in Security Metrics Research. National Institute of Standards and Technology Special publication# NISTIR 7564 (2009)
Vaughn, R.B., Henning, R., Siraj, A.: Information Assurance Measures and Metrics – State of Practice and Proposed Taxonomy. In: Proceedings of the IEEE/HICSS 2003, Hawaii (2002)
Seddigh, N., Pieda, P., Matrawy, A., Nandy, B., Lambadaris, L., Hatfield, A.: Current Trends and Advances in Information Assurance Metrics. In: Proc. of PST 2004, pp. 197–205 (2004)
Savola, R.M.: Towards a Taxonomy for Information Security Metrics. In: International Conference on Software Engineering Advances (ICSEA 2007), Cap Esterel, France (2007)
Common Criteria for information Technology, part 1-3, version 3.1 (September 2006)
Stoneburner, G.: Underlying Technical Models for Information Technology Security, National Institute of Standards and technology Special publication #800-33 (2001)
Mouratidis, H., Giorgini, P.: Secure Tropos: A Security-Oriented Extension of the Tropos methodology. International Journal of Software Engineering and Knowledge Engineering (IJSEKE) 17(2), 285–309 (2007)
Jürjens, J.: Secure Systems Development with UML. Springer, Berlin (2005)
Bulut, E., Khadraoui, D., Marquet, B.: Multi-Agent based security assurance monitoring system for telecommunication infrastructures. In: Proceedings to the Communication, Network, and Information Security conference, Berkely/California (2007)
Bugyo project, http://projects.celtic-initiative.org/bugyo/ (accessed: March 8, 2009)
Evans, D.L., Bond, P.J., Bement, A.L.: Standards for Security categorization of Federal Information And Information Systems. NIST Gaithersburg, MD 20899-8900 (2004)
Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE), Carnegie Mellon - Software Engineering Institute (June 1999)
CRAMM, CCTA Risk Analysis and Management Method, http://www.cramm.com/
OLF Guideline No 123: Classification of process control, safety and support ICT systems based on criticality, Norway (2009)
Ouedraogo, M., Mouratidis, H., Khadraoui, D., Dubois, E.: A probe capability metric taxonomy for assurance evaluation. In: Proceedings of UEL 5th conference on Advances in Computing and Technology Conference (AC&T), England (2010)
Wooldridge, M.: An Introduction to Multi-Agent Systems. John Wiley & Sons, Chichester (2002)
Jennings, N.R.: An agent-based software engineering. In: Garijo, F.J., Boman, M. (eds.) MAAMAW 1999. LNCS, vol. 1647. Springer, Heidelberg (1999)
JADE, http://jade.tilab.com (accessed: March 10, 2008)
Samhain, http://www.la-samhain.de/samhain (accessed: March 10, 2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ouedraogo, M., Mouratidis, H., Dubois, E., Khadraoui, D. (2010). Information Systems Security Criticality and Assurance Evaluation. In: Kim, Th., Adeli, H. (eds) Advances in Computer Science and Information Technology. AST ACN 2010 2010. Lecture Notes in Computer Science, vol 6059. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13577-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-13577-4_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13576-7
Online ISBN: 978-3-642-13577-4
eBook Packages: Computer ScienceComputer Science (R0)