Security Engineering

نویسندگان

  • Marshall D. Abrams
  • Harold J. Podell
  • Daniel W. Gambel
چکیده

This essay is concerned with trusted system integration and/or development to meet multilevel security (MLS) and operational requirements. It addresses technical issues such as how to combine products securely, TCB alternatives, and typical security engineering phases — as well as the management concerns of certification and accreditation. This essay addresses the integration of multilevel security (MLS) technology into the concept definition, acquisition, design, product selection , and MLS integration phases of an operational system. Trade-off analysis is required among factors such as technical risk, security risk, cost, and satisfaction of operational requirements. The essay is divided into four phases: 1. In the requirements phase, we discuss policy determination, the need to identify trust requirements, application of user and mission requirements, use and development of the security Concept of Operations (ConOps), applications for scenarios, and selection of the correct version of security policy. 2. During the design phase, we discuss how to apply design guidance and regulations, and consider the advisability of including certification team participation in design. 3. Discussion of the integration phase surfaces issues from MLS integration policy needed, how to combine products securely, determination of whether to build or buy a TCB, use and considerations of trusted and untrusted processes, considerations for porting untrusted applications to a TCB, and approaching complex systems. 4. In closing, we discuss aspects of certification and accreditation, including the role of certification and accreditation (C&A) and establishing a C&A program.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A View-based Approach for Service-Oriented Security Architecture Specification

Developing secure software is still a software engineering challenge because of the complexity of software security. Yet integrating security engineering and software engineering is increasingly important, especially for serviceoriented applications, as they are exposed to new security challenges due to their open nature. Current security engineering approaches do not consider existing security...

متن کامل

Security Engineering towards Building a Secure Software

Information Systems Security is one of the most critical challenges presently facing nearly every one of the organizations. However, making certain security and quality in both information and the systems which control information is a difficult goal necessitating the mixture of two wide research disciplines which are typically separate: security engineering and secure software engineering. Sec...

متن کامل

Software Security Engineering: Design and Applications

Muthu Ramachandran from Leeds Metropolitan University, UK has recently published a book entitled, Software Security Engineering: Design and Applications. The author claims that the book provides systematic approaches to engineering, building and assuring software security throughout software lifecycle, software security based requirements engineering, design for software security, software secu...

متن کامل

Security Engineering Approach for the Development of Secure Information Systems

Even though software engineering have become a fundamental component to produce information systems and related software components, it is not adequate and effective for developing secure information systems. In this paper, we propose holistic, consistent, and integrated security engineering procedures for analyzing, designing, developing, testing, and maintaining secure enterprise information ...

متن کامل

An architectural systems engineering methodology for addressing cyber security

This paper discusses important shortcomings of current approaches to systems security engineering. The value and limitations of perimeter security designs are examined. An architectural approach to systems security engineering is introduced as a complementary means for strengthening current approaches. Accordingly, this paper outlines a methodology to identify classes of new reusable system sec...

متن کامل

WorSE: A Workbench for Model-based Security Engineering

IT systems with sophisticated security requirements increasingly apply problemspecific security policies for specifying, analyzing, and implementing security properties. Due to their key role for defining and enforcing strategic security concepts, security polices are extremely critical, and quality assets such as policy correctness or policy consistency are essential objectives in policy engin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006