A Framework for Evaluation of Information Systems Security
نویسندگان
چکیده
Evaluating information systems security is a process which involves identifying, gathering, and analysing security functionality and assurance level against criteria. This can result in a measure of trust that indicates how well the system meets a particular security target. It is desirable that the trust one can have on system is measurable and quantifiable through out the systems life cycle. Generally this is referred to as Information Security Assurance. However, security assurance is costly and time consuming. This can partly be attributed to non technical assurance factors, the choice of assurance technique and tools, composition, lack of reuse, life cycle assurance and lack of metrics which are essential for cost and effort estimation. Assurance for complex systems like electronic commerce is still abstract because when the systems complexity increased, it becomes harder to examine whether security requirements has been met and therefore the concept of perfect security proves to be unachievable goal for both computer systems vendors and consumers. This work is based on the Common Criteria (CC) which is an established method for security functions identification, assurance levels classification and development of Protection Profiles. In this research an Information Security Assurance Framework is proposed. This can be used to address the Information Security Assurance problem taking into consideration non-technical assurance factors, re-use of Protection Profiles and use of security metrics in the process of information assurance. A Protection Profile defines an implementation-independent set of IT security requirements for a category of IT products. Such products are intended to meet common consumer needs for IT security. Consumers can therefore construct or cite a PP to express their IT security needs without reference to any specific product.
منابع مشابه
امنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...
متن کاملAn Authorization Framework for Database Systems
Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملHow to Evaluate Health Information Systems: Evaluation stages
The most important goal of health systems is improvement of quality, effectiveness and efficiency of health services. To achieve this goal, health care organizations should establish a proper structure for evaluating health information systems. Health information system evaluation is expected to identify the existing problems of the system through measuring specific indicators. The main objecti...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملDefining evaluation criteria for Health Information Systems using Human, organization and technology-fit factors (HOT-fit): systematic review
Introduction: The purpose of this study is to conduct a review of a series of published studies on evaluation of health information systems in order to determine the criteria of evaluation of hospital information systems using HOT-fit framework Information sources or data: The present study is a review study to evaluate articles of English databases PubMed, scupos and Persian databases Irandoc...
متن کامل