Security Engineering
نویسندگان
چکیده
This essay is concerned with trusted system integration and/or development to meet multilevel security (MLS) and operational requirements. It addresses technical issues such as how to combine products securely, TCB alternatives, and typical security engineering phases — as well as the management concerns of certification and accreditation. This essay addresses the integration of multilevel security (MLS) technology into the concept definition, acquisition, design, product selection , and MLS integration phases of an operational system. Trade-off analysis is required among factors such as technical risk, security risk, cost, and satisfaction of operational requirements. The essay is divided into four phases: 1. In the requirements phase, we discuss policy determination, the need to identify trust requirements, application of user and mission requirements, use and development of the security Concept of Operations (ConOps), applications for scenarios, and selection of the correct version of security policy. 2. During the design phase, we discuss how to apply design guidance and regulations, and consider the advisability of including certification team participation in design. 3. Discussion of the integration phase surfaces issues from MLS integration policy needed, how to combine products securely, determination of whether to build or buy a TCB, use and considerations of trusted and untrusted processes, considerations for porting untrusted applications to a TCB, and approaching complex systems. 4. In closing, we discuss aspects of certification and accreditation, including the role of certification and accreditation (C&A) and establishing a C&A program.
منابع مشابه
A View-based Approach for Service-Oriented Security Architecture Specification
Developing secure software is still a software engineering challenge because of the complexity of software security. Yet integrating security engineering and software engineering is increasingly important, especially for serviceoriented applications, as they are exposed to new security challenges due to their open nature. Current security engineering approaches do not consider existing security...
متن کاملSecurity Engineering towards Building a Secure Software
Information Systems Security is one of the most critical challenges presently facing nearly every one of the organizations. However, making certain security and quality in both information and the systems which control information is a difficult goal necessitating the mixture of two wide research disciplines which are typically separate: security engineering and secure software engineering. Sec...
متن کاملSoftware Security Engineering: Design and Applications
Muthu Ramachandran from Leeds Metropolitan University, UK has recently published a book entitled, Software Security Engineering: Design and Applications. The author claims that the book provides systematic approaches to engineering, building and assuring software security throughout software lifecycle, software security based requirements engineering, design for software security, software secu...
متن کاملSecurity Engineering Approach for the Development of Secure Information Systems
Even though software engineering have become a fundamental component to produce information systems and related software components, it is not adequate and effective for developing secure information systems. In this paper, we propose holistic, consistent, and integrated security engineering procedures for analyzing, designing, developing, testing, and maintaining secure enterprise information ...
متن کاملAn architectural systems engineering methodology for addressing cyber security
This paper discusses important shortcomings of current approaches to systems security engineering. The value and limitations of perimeter security designs are examined. An architectural approach to systems security engineering is introduced as a complementary means for strengthening current approaches. Accordingly, this paper outlines a methodology to identify classes of new reusable system sec...
متن کاملWorSE: A Workbench for Model-based Security Engineering
IT systems with sophisticated security requirements increasingly apply problemspecific security policies for specifying, analyzing, and implementing security properties. Due to their key role for defining and enforcing strategic security concepts, security polices are extremely critical, and quality assets such as policy correctness or policy consistency are essential objectives in policy engin...
متن کامل