Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges

被引:11
|
作者
Sun, Nan [1 ,2 ]
Li, Chang-Tsun [3 ]
Chan, Hin [4 ]
Le, Ba Dung [2 ,5 ]
Islam, Md Zahidul [6 ]
Zhang, Leo Yu [3 ]
Islam, Md Rafiqul [7 ]
Armstrong, Warren [8 ]
机构
[1] Univ New South Wales, Sch Engn & Informat Technol, Canberra, ACT 2612, Australia
[2] Cyber Secur Cooperat Res Ctr, Joondalup, WA 6027, Australia
[3] Deakin Univ, Sch Informat Technol, Waurn Ponds, Vic 3216, Australia
[4] Australian Cyber Secur Ctr, Kingston, ACT 2604, Australia
[5] Charles Sturt Univ, Sch Comp Math & Engn, Wagga Wagga, NSW 2678, Australia
[6] Charles Sturt Univ, Sch Comp Math & Engn, Bathurst, NSW 2795, Australia
[7] Charles Sturt Univ, Sch Comp Math & Engn, Albury, NSW 2640, Australia
[8] QuintessenceLabs Pty Ltd, Canberra, ACT 2609, Australia
关键词
Security; Computer crime; Standards; Certification; Australia; Sun; Market research; Common criteria; cyber security; protection profile; security standard and certification; trusted system; KEY MANAGEMENT; CYBERSECURITY;
D O I
10.1109/ACCESS.2022.3168716
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in emerging Information and Communications Technology (ICT) technologies push the boundaries of what is possible and open up new markets for innovative ICT products and services. The adoption of ICT products and systems with security properties depends on consumers' confidence and markets' trust in the security functionalities and whether the assurance measures applied to these products meet the inherent security requirements. Such confidence and trust are primarily gained through the rigorous development of security requirements, validation criteria, evaluation, and certification. The Common Criteria for Information Technology Security Evaluation (often referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for cyber security. Motivated by encouraging the adoption of the CC that is used for ICT security evaluation and certification, in this paper, we conduct a systematic review of the CC standard and its adoptions. Adoption barriers of the CC are investigated based on the analysis of current trends in cyber security evaluation. In addition, we share the experiences and lessons gained through the recent Development of Australian Cyber Criteria Assessment (DACCA) project on the development of the Protection Profile that defines security requirements with the CC. Best practices, challenges, and future directions on defining security requirements for trusted cyber security advancement are presented.
引用
收藏
页码:44756 / 44777
页数:22
相关论文
共 50 条
  • [31] Analyzing the Requirements for a Robust Security Criteria and Management of Multi Level Security in the Clouds
    Farroha, Bassam S.
    Farroha, Deborah L.
    DEFENSE TRANSFORMATION AND NET-CENTRIC SYSTEMS 2011, 2011, 8062
  • [32] High robustness requirements in a Common Criteria protection profile
    Nguyen, Thuy D.
    Levin, Timothy E.
    Irvine, Cynthia E.
    FOURTH IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2006, : 66 - +
  • [33] Security Requirements Engineering in the Wild: A Survey of Common Practices
    Elahi, Golnaz
    Yu, Eric
    Li, Tong
    Liu, Lin
    2011 35TH IEEE ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2011, : 314 - 319
  • [34] Towards a Common Security and Privacy Requirements Elicitation Methodology
    Makri, Eleni-Laskarina
    Lambrinoudakis, Costas
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 151 - 159
  • [35] A survey on internet of things security: Requirements, challenges, and solutions
    HaddadPajouh, Hamed
    Dehghantanha, Ali
    Parizi, Reza M.
    Aledhari, Mohammed
    Karimipour, Hadis
    INTERNET OF THINGS, 2021, 14
  • [36] Security Requirements Engineering Process for Web Applications
    Salini, P.
    Kanmani, S.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 2799 - 2807
  • [37] Security requirements engineering; State of the art and research challenges
    Hadavi, M. A.
    Hamishagi, V. S.
    Sangchi, H. M.
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 985 - 990
  • [38] Network Security Challenges in Android Applications
    Buhov, Damjan
    Huber, Markus
    Merzdovnik, Georg
    Weippl, Edgar
    Dimitrova, Vesna
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 327 - 332
  • [39] Mobile RFID applications and security challenges
    Konidala, Divyan M.
    Kim, Kwangjo
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2006, PROCEEDINGS, 2006, 4296 : 194 - +
  • [40] Internet of Everything: Applications, and Security Challenges
    Sajid, Muhammad
    Harris, Ali
    Habib, Shaista
    4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 285 - +