Information technology security system engineering methodology

被引:0
|
作者
Childs, D [1 ]
机构
[1] CALTECH, Jet Prop Lab, Pasadena, CA 91109 USA
来源
2003 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-8 | 2003年
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.
引用
收藏
页码:3393 / 3401
页数:9
相关论文
共 50 条
  • [21] Design of DRM System Based on the Information Security Technology
    Liang, Zhengli
    Cai, Dongmei
    2014 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND AUTOMATION (ICMEA), 2014, : 335 - 341
  • [22] Study and Application on Security Technology of Computer Information System
    Liu, Yan
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 325 - 328
  • [23] A security evaluation and testing methodology for open source software embedded information security system
    Choi, SJ
    Kang, YH
    Lee, GS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 215 - 224
  • [24] Information technology security
    Elliott, AT
    NUCLEAR MEDICINE COMMUNICATIONS, 2003, 24 (12) : 1205 - 1205
  • [26] Web Engineering Security (WES) Methodology
    Glisson, William Bradley
    Welland, Ray
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2014, 34 : 1359 - 1396
  • [27] An information security engineering paradigm for overcoming information security crisis
    Jei, Yeun-hee
    Bae, Ick-whan
    Choi, Sung-ja
    Lee, Gang-soo
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 453 - +
  • [28] PREPARATION OF SPECIALISTS IN THE AREA OF INFORMATION TECHNOLOGY SECURITY IN MOSCOW ENGINEERING PHYSICS INSTITUTE
    MALYUK, AA
    GORBATOV, VS
    PETROV, VA
    TOLSTOI, AI
    SECURITY AND CONTROL OF INFORMATION TECHNOLOGY IN SOCIETY, 1994, 43 : 91 - 96
  • [29] Research on Network Security Management and Protection Technology of Information System
    Xu, Raoshan
    INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY AND ENVIRONMENT PROTECTION (ICSEEP 2015), 2015, : 1036 - 1042
  • [30] An Optimization Model of Product Selection in Information Security Technology System
    Qiu, Qi-Rong
    Pan, Zhi
    Peng, Wu-An
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL I, 2009, : 474 - 478