Automated Security Configuration Checklist for Apple iOS Devices using SCAP v1.2

被引:0
|
作者
Adetunji, Akinbobola Oluwaseun [1 ]
Butakov, Sergey [1 ]
Zavarsky, Pavol [1 ]
机构
[1] Concordia Univ Edmonton, Informat Syst Secur & Assurance Management, Edmonton, AB, Canada
关键词
security automation; SCAP; compliance; Apple iOS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security content automation includes configurations of large number of systems, installation of patches securely, verification of security-related configuration settings, compliance with security policies and regulatory requirements, and ability to respond quickly when new threats are discovered [1]. Although humans are important in information security management, humans sometimes introduce errors and inconsistencies in an organization due to manual nature of their tasks [2]. Security Content Automation Protocol was developed by the U.S. NIST to automate information security management tasks such as vulnerability and patch management, and to achieve continuous monitoring of security configurations in an organization. In this paper, SCAP is employed to develop an automated security configuration checklist for use in verifying Apple iOS device configuration against the defined security baseline to enforce policy compliance in an enterprise.
引用
收藏
页码:120 / 124
页数:5
相关论文
共 18 条
  • [1] Automated Security Configuration Checklist for a Cisco IPsec VPN Router using SCAP 1.2
    Peterside, Gabriel Biedima
    Zavarsky, Pavol
    Butakov, Sergey
    [J]. 2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 355 - 360
  • [2] Using R in Taverna: RShell v1.2
    Wassink I.
    Rauwerda H.
    Neerincx P.B.
    Vet P.E.V.D.
    Breit T.M.
    Leunissen J.A.
    Nijholt A.
    [J]. BMC Research Notes, 2 (1)
  • [3] iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
    Liu, Jigang
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2011, 6 (04) : 63 - 66
  • [4] iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
    Garfinkel, Simson
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2013, 8 (04) : 65 - 67
  • [5] Automated Audiometry Using Apple iOS-Based Application Technology
    Foulad, Allen
    Bui, Peggy
    Djalilian, Hamid
    [J]. OTOLARYNGOLOGY-HEAD AND NECK SURGERY, 2013, 149 (05) : 700 - 706
  • [6] The DOE E3SM v1.2 Cryosphere Configuration: Description and Simulated Antarctic Ice-Shelf Basal Melting
    Comeau, Darin
    Asay-Davis, Xylar S.
    Begeman, Carolyn Branecky
    Hoffman, Matthew J.
    Lin, Wuyin
    Petersen, Mark R.
    Price, Stephen F.
    Roberts, Andrew F.
    Van Roekel, Luke P.
    Veneziani, Milena
    Wolfe, Jonathan D.
    Fyke, Jeremy G.
    Ringler, Todd D.
    Turner, Adrian K.
    [J]. JOURNAL OF ADVANCES IN MODELING EARTH SYSTEMS, 2022, 14 (02)
  • [7] ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies
    Aslam, Mudassar
    Gehrmann, Christian
    Bjorkman, Mats
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 22 (28-39) : 28 - 39
  • [8] Automated Identification of Security-Relevant Configuration Settings Using NLP
    Stockle, Patrick
    Wasserer, Theresa
    Grobauer, Bernd
    Pretschner, Alexander
    [J]. PROCEEDINGS OF THE 37TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2022, 2022,
  • [9] Optimizing Ultrasonic and Barometric Sensors for Quadcopter's Altitude-Hold Using YoHe V1.2 PID and KK V2.0 Boards
    Yusuf, Yohanes Gunawan
    Agung, Hendi Wicaksono
    [J]. 2016 INTERNATIONAL SEMINAR ON SENSORS, INSTRUMENTATION, MEASUREMENT AND METROLOGY (ISSIMM), 2016, : 37 - 42
  • [10] Towards Strengthening the Security of Healthcare Devices using Secure Configuration Provenance
    Hasan, Ragib
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON DIGITAL HEALTH (IEEE ICDH 2022), 2022, : 228 - 233