IT Security Certifications: Stakeholder Evaluation and Selection

نویسندگان

  • Nicholas J.A. Tate
  • Sharman Lichtenstein
  • Matthew J. Warren
چکیده

Information technology (IT) security certifications have proliferated in recent years. However they differ in regards to stakeholder considerations of credibility, accessibility and relevance. Key stakeholders with an interest in selecting an IT security certification (IT security professionals, employers, governments and higher education institutes) lack a systematic approach for differentiating between candidate certifications and selecting the “best” certification to satisfy requirements. The paper focuses on reporting a confirmatory focus group from a recent research project. It provides a framework for supporting stakeholder evaluation and selection of IT security certifications and discusses key implications for the IT security industry, IT security certifications, and the higher education sector.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework

This paper reports a preliminary framework that supports stakeholder evaluation, comparison and selection of IT Security Certification schemes. The framework may assist users in the selection of the most appropriate scheme to meet their particular needs.

متن کامل

Understanding Managers' Intent to Use IT Certification as a Selection Tool in the Hiring Process

A growing number of IT professionals believe that being certified will give them advantages when looking for jobs and many managers use IT certification as a selection tool when hiring. However, some managers have questioned the value of certifications or of some certifications in particular. The purpose of this research is to determine the factors that predict managers’ intentions to use IT ce...

متن کامل

Evaluation with Virtual Prototyping and Static Analysis of the Security of Hardware and Software Systems against Laser Attacks

Laser allows attackers to realize very efficient attacks which threaten the security of digital systems [FA06]. These attacks consist in using a laser to inject errors at specific times targeting specific components in the digital system. This digital system is a hardware architecture which executes a software application. The injected errors can then be propagated or masked, both by the hardwa...

متن کامل

Cloud Service Certifications: Measuring Consumers' Preferences For Assurances

Cloud computing by now has gained wide recognition in business and is becoming increasingly important for consumers. However, consumers experience uncertainties, such as security, privacy, and vendor lock-in. Certifications provide assurances and may mitigate uncertainties, making cloud service certifications a core focus of the European Union’s cloud strategy and various certification programs...

متن کامل

Extending Linux for Multi-Level Security

LinuxTM distributions have received numerous Common Criteria certifications in the last few years. Building on the recent Controlled Access Protection Profile (CAPP) certifications, an Open Source development effort to make Linux compliant with the Labeled Security Protection Profile (LSPP) and Role-Based Access Control Protection Profile (RBACPP) has been ongoing for almost two years. Developm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017