Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges

被引:11
|
作者
Sun, Nan [1 ,2 ]
Li, Chang-Tsun [3 ]
Chan, Hin [4 ]
Le, Ba Dung [2 ,5 ]
Islam, Md Zahidul [6 ]
Zhang, Leo Yu [3 ]
Islam, Md Rafiqul [7 ]
Armstrong, Warren [8 ]
机构
[1] Univ New South Wales, Sch Engn & Informat Technol, Canberra, ACT 2612, Australia
[2] Cyber Secur Cooperat Res Ctr, Joondalup, WA 6027, Australia
[3] Deakin Univ, Sch Informat Technol, Waurn Ponds, Vic 3216, Australia
[4] Australian Cyber Secur Ctr, Kingston, ACT 2604, Australia
[5] Charles Sturt Univ, Sch Comp Math & Engn, Wagga Wagga, NSW 2678, Australia
[6] Charles Sturt Univ, Sch Comp Math & Engn, Bathurst, NSW 2795, Australia
[7] Charles Sturt Univ, Sch Comp Math & Engn, Albury, NSW 2640, Australia
[8] QuintessenceLabs Pty Ltd, Canberra, ACT 2609, Australia
关键词
Security; Computer crime; Standards; Certification; Australia; Sun; Market research; Common criteria; cyber security; protection profile; security standard and certification; trusted system; KEY MANAGEMENT; CYBERSECURITY;
D O I
10.1109/ACCESS.2022.3168716
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in emerging Information and Communications Technology (ICT) technologies push the boundaries of what is possible and open up new markets for innovative ICT products and services. The adoption of ICT products and systems with security properties depends on consumers' confidence and markets' trust in the security functionalities and whether the assurance measures applied to these products meet the inherent security requirements. Such confidence and trust are primarily gained through the rigorous development of security requirements, validation criteria, evaluation, and certification. The Common Criteria for Information Technology Security Evaluation (often referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for cyber security. Motivated by encouraging the adoption of the CC that is used for ICT security evaluation and certification, in this paper, we conduct a systematic review of the CC standard and its adoptions. Adoption barriers of the CC are investigated based on the analysis of current trends in cyber security evaluation. In addition, we share the experiences and lessons gained through the recent Development of Australian Cyber Criteria Assessment (DACCA) project on the development of the Protection Profile that defines security requirements with the CC. Best practices, challenges, and future directions on defining security requirements for trusted cyber security advancement are presented.
引用
收藏
页码:44756 / 44777
页数:22
相关论文
共 50 条
  • [21] ENHANCING GOAL-ORIENTED SECURITY REQUIREMENTS ANALYSIS USING COMMON CRITERIA-BASED KNOWLEDGE
    Saeki, Motoshi
    Hayashi, Shinpei
    Kaiya, Haruhiko
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2013, 23 (05) : 695 - 720
  • [22] Securing Smart Home: Technologies, Security Challenges, and Security Requirements
    Lee, Changmin
    Zappaterra, Luca
    Choi, Kwanghee
    Choi, Hyeong-Ah
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 67 - 72
  • [23] Reusable Security Requirements for Healthcare Applications
    Jensen, Jostein
    Tondel, Inger Anne
    Jaatun, Martin Gilje
    Meland, Per Hakon
    Andresen, Herbjorn
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 380 - 385
  • [24] Concepts and criteria defining emerging microbiome applications
    Kostic, Tanja
    Schloter, Michael
    Arruda, Paulo
    Berg, Gabriele
    Charles, Trevor C.
    Cotter, Paul D.
    Kiran, George Seghal
    Lange, Lene
    Maguin, Emmanuelle
    Meisner, Annelein
    van Overbeek, Leo
    Sanz, Yolanda
    Sarand, Inga
    Selvin, Joseph
    Tsakalidou, Effie
    Smidt, Hauke
    Wagner, Martin
    Sessitsch, Angela
    MICROBIAL BIOTECHNOLOGY, 2024, 17 (09):
  • [25] Reusable security requirements for healthcare applications
    Jensen, Jostein
    Toøndel, Inger Anne
    Jaatun, Martin Gilje
    Meland, Per Håkon
    Andresen, Herbjørn
    Proceedings - International Conference on Availability, Reliability and Security, ARES 2009, 2009, : 380 - 385
  • [26] Security and Privacy in Video Surveillance: Requirements and Challenges
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 169 - 184
  • [27] Security Applications and Challenges in Blockchain
    Draper, Austin
    Familrouhani, Aryan
    Cao, Devin
    Heng, Tevisophea
    Han, Wenlin
    2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2019,
  • [28] Formal Verification of Security Specifications with Common Criteria
    Morimoto, Shoichi
    Shigematsu, Shinjiro
    Goto, Yuichi
    Cheng, Jingde
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 1506 - +
  • [29] Common Criteria Based Security Scenario Verification
    Ohnishi, Atsushi
    SOFTWARE AND DATA TECHNOLOGIES, 2009, 47 : 37 - 47
  • [30] Security requirements elicitation via weaving scenarios based on security evaluation criteria
    Itoga, Hiroya
    Ohnishi, Atsushi
    USIC 2007: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2007, : 70 - 79