• DocumentCode
    3003169
  • Title

    Rationale for and Capabilities of IT Security Assessment

  • Author

    Hallberg, Niklas ; Hallberg, Jonas ; Hunstad, Amund

  • Author_Institution
    Swedish Defence Res. Agency, Linkoping
  • fYear
    2007
  • fDate
    20-22 June 2007
  • Firstpage
    159
  • Lastpage
    166
  • Abstract
    The abundance of security threats makes IT security a prerequisite for the use of information technology (IT). Striving for appropriate security, costs for IT security controls should be related to their impact on the level of IT security. This requires the level of IT security to be assessed. However, this insight is to general to guide the design of methods and tools for IT security assessments. Thereby, there is a necessity to explore what are the rationale for IT security assessments, i.e., why, where, and when is it needed. The objective of this study is to explore the rationale for and capabilities required of methods and tools for IT security assessment. The knowledge, about rationale and needed capabilities, should constitute as a foundation for the future development of methods and tools regarding IT security assessment. The study was performed as a case study within the Swedish Armed Forces. Based on interviews and relevant documents, statements directly or indirectly indicating the need for IT security assessments were identified. These statements were carefully analyzed to identify IT security issues. Thereafter, the IT security issues were categorized into six categories: (1) systems development, (2) system operation, (3) risk management, (4) communication and management of security work, (5) competence regarding IT security and (6) attainment and preservation of trust. From these categories, 18 contributions to the rationale for IT security assessments were identified and used to determine capabilities needed of tools and methods for IT security assessments. These capabilities of IT security assessment are presented by criteria ordered in the categories: security assessment domains, security relevant factors, characteristics of security controls, and assessments results.
  • Keywords
    military computing; risk management; security of data; IT security assessment; Swedish Armed Forces; information technology; risk management; system operation; systems development; Communication system operations and management; Communication system security; Conferences; Costs; Data security; Design methodology; Information security; Information technology; Risk management; Usability; IT security; IT security assessment; case study;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC
  • Conference_Location
    West Point, NY
  • Print_ISBN
    1-4244-1304-4
  • Electronic_ISBN
    1-4244-1304-4
  • Type

    conf

  • DOI
    10.1109/IAW.2007.381928
  • Filename
    4267556