A Systematic Approach to the Management of System Security Reengineering Process

A Systematic Approach to the Management of System Security Reengineering Process

Author: Ghanem Ibrahim Elsharhry

Publisher:

Published: 2005

Total Pages: 134

ISBN-13:

DOWNLOAD EBOOK

"With the increasing dependency on the electronic world for doing business using computers, palms, wireless devices, and the Internet, there is a need for revising the security measures and controls built into existing communication and computer systems. Several computer-based systems were originally built without considering the security in the system development phase. Consequently, a systematic approach to the management of the reengineering of system's security is recommended. The goal is to ensure that all critical services are well protected and less vulnerable to security threats. Ultimately, the system will be secured according to the organization's business security needs and business continuity plan. The proposed approach uses formal and standard specification techniques for describing security requirements and developing security acceptance test cases."--Abstract, p. iii.


Total Security Process Reengineering

Total Security Process Reengineering

Author: Nikos Bogonikolos

Publisher: Lulu.com

Published: 2013-07-13

Total Pages: 231

ISBN-13: 1304172228

DOWNLOAD EBOOK

Total Security Process Reengineering is a Holistic Security Approach Methodology. Total Security Process Re-engineering (TSPR) aiming at improvements by means of elevating efficiency and effectiveness of the processes that exist within and across security systems. The key to '' The Total Security Process Re-engineering '' is for all security systems to look at their security processes from a "clean slate" perspective and determine how they can best construct these processes to improve how they conduct and achieve the Total Security Management based on TSPR Model. Total Security Process Re-engineering (TSPR) began as a technique to help all security systems fundamentally rethink how they run their security issues in order to dramatically improve customer effectiveness & efficiency, cut security operational costs, and become world-class competitors in Security Industry. A key stimulus for reengineering has been the continuing development and deployment of sophisticated information systems and networks.


Emerging Trends in ICT Security

Emerging Trends in ICT Security

Author: Logan O. Mailloux

Publisher: Elsevier Inc. Chapters

Published: 2013-11-06

Total Pages: 35

ISBN-13: 0128070587

DOWNLOAD EBOOK

This chapter discusses the problematic intersection of risk management, mission assurance, security, and information systems through the illustrative example of the United States (US) Department of Defense (DoD). A concise history of systems security engineering (SSE) is provided with emphasis on recent revitalization efforts. Next, a review of established and emerging SSE methods, processes, and tools (MPT) frequently used to assess and manage critical shortfalls in the development and fielding of complex information-centric systems is provided. From this review, a common theme emerges—the need for a holistic multidisciplinary approach that addresses people, processes, and technologies to manage system complexity, while providing cost-effective security solutions through the use of established systems engineering techniques. Multiple cases and scenarios that promote the discovery and shared understanding of security solutions for complex systems by those trained in the art and science of systems engineering, information security, and risk management are demonstrated.


Towards a More Systematic Approach to Secure Systems Design and Analysis

Towards a More Systematic Approach to Secure Systems Design and Analysis

Author: Simon Miller

Publisher:

Published: 2016

Total Pages: 23

ISBN-13:

DOWNLOAD EBOOK

The task of designing secure software systems is fraught with uncertainty, as data on uncommon attacks is limited, costs are difficult to estimate, and technology and tools are continually changing. Consequently, experts may interpret the security risks posed to a system in different ways, leading to variation in assessment. This paper presents research into measuring the variability in decision making between security professionals, with the ultimate goal of improving the quality of security advice given to software system designers. A set of thirty nine cyber-security experts took part in an exercise in which they independently assessed a realistic system scenario. This study quantifies agreement in the opinions of experts, examines methods of aggregating opinions, and produces an assessment of attacks from ratings of their components. We show that when aggregated, a coherent consensus view of security emerges which can be used to inform decisions made during systems design.


Managing Cybersecurity in the Process Industries

Managing Cybersecurity in the Process Industries

Author: CCPS (Center for Chemical Process Safety)

Publisher: John Wiley & Sons

Published: 2022-04-12

Total Pages: 484

ISBN-13: 1119861802

DOWNLOAD EBOOK

The chemical process industry is a rich target for cyber attackers who are intent on causing harm. Current risk management techniques are based on the premise that events are initiated by a single failure and the succeeding sequence of events is predictable. A cyberattack on the Safety, Controls, Alarms, and Interlocks (SCAI) undermines this basic assumption. Each facility should have a Cybersecurity Policy, Implementation Plan and Threat Response Plan in place. The response plan should address how to bring the process to a safe state when controls and safety systems are compromised. The emergency response plan should be updated to reflect different actions that may be appropriate in a sabotage situation. IT professionals, even those working at chemical facilities are primarily focused on the risk to business systems. This book contains guidelines for companies on how to improve their process safety performance by applying Risk Based Process Safety (RBPS) concepts and techniques to the problem of cybersecurity.


Software Security Engineering

Software Security Engineering

Author: Nancy R. Mead

Publisher: Addison-Wesley Professional

Published: 2004-04-21

Total Pages: 368

ISBN-13: 0132702452

DOWNLOAD EBOOK

Software Security Engineering draws extensively on the systematic approach developed for the Build Security In (BSI) Web site. Sponsored by the Department of Homeland Security Software Assurance Program, the BSI site offers a host of tools, guidelines, rules, principles, and other resources to help project managers address security issues in every phase of the software development life cycle (SDLC). The book’s expert authors, themselves frequent contributors to the BSI site, represent two well-known resources in the security world: the CERT Program at the Software Engineering Institute (SEI) and Cigital, Inc., a consulting firm specializing in software security. This book will help you understand why Software security is about more than just eliminating vulnerabilities and conducting penetration tests Network security mechanisms and IT infrastructure security services do not sufficiently protect application software from security risks Software security initiatives should follow a risk-management approach to identify priorities and to define what is “good enough”–understanding that software security risks will change throughout the SDLC Project managers and software engineers need to learn to think like an attacker in order to address the range of functions that software should not do, and how software can better resist, tolerate, and recover when under attack


ENTERprise Information Systems, Part I

ENTERprise Information Systems, Part I

Author: Joao Eduardo Quintela Varajao

Publisher: Springer Science & Business Media

Published: 2010-10-08

Total Pages: 472

ISBN-13: 3642164013

DOWNLOAD EBOOK

This book constitutes the proceedings of the International Conference on ENTERprise information systems, held Viana do Castelo, Portugal, in October 2010.


Systems Security Engineering

Systems Security Engineering

Author: United States Department of Commerce

Publisher: Createspace Independent Publishing Platform

Published: 2017-07-03

Total Pages: 262

ISBN-13: 9781548558147

DOWNLOAD EBOOK

With the continuing frequency, intensity, and adverse consequences of cyber-attacks, disruptions, hazards, and other threats to federal, state, and local governments, the military, businesses, and the critical infrastructure, the need for trustworthy secure systems has never been more important to the long-term economic and national security interests of the United States. Engineering-based solutions are essential to managing the growing complexity, dynamicity, and interconnectedness of today's systems, as exemplified by cyber-physical systems and systems-of-systems, including the Internet of Things. This publication addresses the engineering-driven perspective and actions necessary to develop more defensible and survivable systems, inclusive of the machine, physical, and human components that compose the systems and the capabilities and services delivered by those systems. It starts with and builds upon a set of well-established International Standards for systems and software engineering published by the International Organization for Standardization (ISO), the International Electrotechnical Commission (IEC), and the Institute of Electrical and Electronics Engineers (IEEE) and infuses systems security engineering methods, practices, and techniques into those systems and software engineering activities. The objective is to address security issues from a stakeholder protection needs, concerns, and requirements perspective and to use established engineering processes to ensure that such needs, concerns, and requirements are addressed with appropriate fidelity and rigor, early and in a sustainable manner throughout the life cycle of the system.


Information Security Management Systems

Information Security Management Systems

Author: Heru Susanto

Publisher: CRC Press

Published: 2018-06-14

Total Pages: 282

ISBN-13: 1351867806

DOWNLOAD EBOOK

This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances. It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001. The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.


Information Systems Security

Information Systems Security

Author: Sokratis Katsikas

Publisher: Springer

Published: 2016-01-09

Total Pages: 496

ISBN-13: 1504129199

DOWNLOAD EBOOK

This book presents a state-of-the-art review of current perspectives in information systems security in view of the information society of the 21st century. It will be essential reading for information technology security specialists, computer professionals, EDP managers, EDP auditors, managers, researchers and students working on the subject.