DocumentCode :
3003169
Title :
Rationale for and Capabilities of IT Security Assessment
Author :
Hallberg, Niklas ; Hallberg, Jonas ; Hunstad, Amund
Author_Institution :
Swedish Defence Res. Agency, Linkoping
fYear :
2007
fDate :
20-22 June 2007
Firstpage :
159
Lastpage :
166
Abstract :
The abundance of security threats makes IT security a prerequisite for the use of information technology (IT). Striving for appropriate security, costs for IT security controls should be related to their impact on the level of IT security. This requires the level of IT security to be assessed. However, this insight is to general to guide the design of methods and tools for IT security assessments. Thereby, there is a necessity to explore what are the rationale for IT security assessments, i.e., why, where, and when is it needed. The objective of this study is to explore the rationale for and capabilities required of methods and tools for IT security assessment. The knowledge, about rationale and needed capabilities, should constitute as a foundation for the future development of methods and tools regarding IT security assessment. The study was performed as a case study within the Swedish Armed Forces. Based on interviews and relevant documents, statements directly or indirectly indicating the need for IT security assessments were identified. These statements were carefully analyzed to identify IT security issues. Thereafter, the IT security issues were categorized into six categories: (1) systems development, (2) system operation, (3) risk management, (4) communication and management of security work, (5) competence regarding IT security and (6) attainment and preservation of trust. From these categories, 18 contributions to the rationale for IT security assessments were identified and used to determine capabilities needed of tools and methods for IT security assessments. These capabilities of IT security assessment are presented by criteria ordered in the categories: security assessment domains, security relevant factors, characteristics of security controls, and assessments results.
Keywords :
military computing; risk management; security of data; IT security assessment; Swedish Armed Forces; information technology; risk management; system operation; systems development; Communication system operations and management; Communication system security; Conferences; Costs; Data security; Design methodology; Information security; Information technology; Risk management; Usability; IT security; IT security assessment; case study;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC
Conference_Location :
West Point, NY
Print_ISBN :
1-4244-1304-4
Electronic_ISBN :
1-4244-1304-4
Type :
conf
DOI :
10.1109/IAW.2007.381928
Filename :
4267556
Link To Document :
بازگشت