Information technology security system engineering methodology

被引:0
|
作者
Childs, D [1 ]
机构
[1] CALTECH, Jet Prop Lab, Pasadena, CA 91109 USA
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.
引用
收藏
页码:3393 / 3401
页数:9
相关论文
共 50 条
  • [1] An information engineering methodology for the security strategy planning
    Kim, S
    Leem, CS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 597 - 607
  • [2] Integrating information security engineering with system engineering with system engineering tools
    Higginbotham, MD
    Maley, JG
    Milheizler, AJ
    Suskie, BJ
    SEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '98), 1998, : 320 - 326
  • [3] Methodology for evaluating information security countermeasures of a system
    Shigematsu, Takaaki
    Chou, Bin-Hui
    Hori, Yoshiaki
    Sakurai, Kouichi
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 433 - +
  • [4] A Flexible Risk-Based Security Evaluation Methodology for Information Communication Technology System Certification
    Matheu, Sara N.
    Martinez-Gil, Juan F.
    Bicchierai, Irene
    Marchel, Jan
    Piliszek, Radoslaw
    Skarmeta, Antonio
    APPLIED SCIENCES-BASEL, 2025, 15 (03):
  • [5] AN INFORMATION SYSTEM FOR PETROLEUM ENGINEERING TECHNOLOGY
    MARTINEZ, SJ
    IEEE TRANSACTIONS ON ENGINEERING WRITING AND SPEECH, 1970, EW13 (02): : 60 - &
  • [6] Security engineering in IT governance for university information system
    Kwon, Ho-Yeol
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 501 - 504
  • [7] Methodology Development of Information Technology Value Engineering using Systems Engineering Approach
    Abdurrahman, Lukman
    Suhardi
    Langi, Armein Z. R.
    2015 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY SYSTEMS AND INNOVATION (ICITSI), 2015,
  • [8] Methodology and Ontology of Expert System for Information Security Audit
    Atymtayeva, Lyazzat B.
    Bortsova, Gerda K.
    Inoue, Atsushi
    Kozhakhmet, Kanat T.
    6TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS, AND THE 13TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS, 2012, : 238 - 243
  • [9] Methodology of quantitative risk assessment for information system security
    Lin, MQ
    Wang, QM
    Li, JH
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 526 - 531
  • [10] Methodology for Creation of Multidisciplinary, Transatlantic Engineering Program in Information Technology
    Grega, Wojciech
    Hilburn, Tom
    Kornecki, Andrew J.
    Rysavy, Ondrej
    Sveda, Miroslav
    Thiriet, Jean-Marc
    2009 EAEEIE ANNUAL CONFERENCE, 2009, : 195 - +