Security Assurance Evaluation and IT Systems’ Context of Use Security Criticality

Security Assurance Evaluation and IT Systems’ Context of Use Security Criticality

Moussa Ouedraogo, Haralambos Mouratidis, Eric Dubois, Djamel Khadraoui
Copyright: © 2011 |Volume: 2 |Issue: 4 |Pages: 23
ISSN: 1947-9158|EISSN: 1947-9166|EISBN13: 9781613507285|DOI: 10.4018/jhcr.2011100104
Cite Article Cite Article

MLA

Ouedraogo, Moussa, et al. "Security Assurance Evaluation and IT Systems’ Context of Use Security Criticality." IJHCR vol.2, no.4 2011: pp.59-81. http://doi.org/10.4018/jhcr.2011100104

APA

Ouedraogo, M., Mouratidis, H., Dubois, E., & Khadraoui, D. (2011). Security Assurance Evaluation and IT Systems’ Context of Use Security Criticality. International Journal of Handheld Computing Research (IJHCR), 2(4), 59-81. http://doi.org/10.4018/jhcr.2011100104

Chicago

Ouedraogo, Moussa, et al. "Security Assurance Evaluation and IT Systems’ Context of Use Security Criticality," International Journal of Handheld Computing Research (IJHCR) 2, no.4: 59-81. http://doi.org/10.4018/jhcr.2011100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Today’s IT systems are ubiquitous and take the form of small portable devices, to the convenience of the users. However, the reliance on this technology is increasing faster than the ability to deal with the simultaneously increasing threats to information security. This paper proposes metrics and a methodology for the evaluation of operational systems security assurance that take into account the measurement of security correctness of a safeguarding measure and the analysis of the security criticality of the context in which the system is operating (i.e., where is the system used and/or what for?). In that perspective, the paper also proposes a novel classification scheme for elucidating the security criticality level of an IT system. The advantage of this approach lies in the fact that the assurance level fluctuation based on the correctness of deployed security measures and the criticality of the context of use of the IT system or device, could provide guidance to users without security background on what activities they may or may not perform under certain circumstances. This work is illustrated with an application based on the case study of a Domain Name Server (DNS).

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.