Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges

被引:11
|
作者
Sun, Nan [1 ,2 ]
Li, Chang-Tsun [3 ]
Chan, Hin [4 ]
Le, Ba Dung [2 ,5 ]
Islam, Md Zahidul [6 ]
Zhang, Leo Yu [3 ]
Islam, Md Rafiqul [7 ]
Armstrong, Warren [8 ]
机构
[1] Univ New South Wales, Sch Engn & Informat Technol, Canberra, ACT 2612, Australia
[2] Cyber Secur Cooperat Res Ctr, Joondalup, WA 6027, Australia
[3] Deakin Univ, Sch Informat Technol, Waurn Ponds, Vic 3216, Australia
[4] Australian Cyber Secur Ctr, Kingston, ACT 2604, Australia
[5] Charles Sturt Univ, Sch Comp Math & Engn, Wagga Wagga, NSW 2678, Australia
[6] Charles Sturt Univ, Sch Comp Math & Engn, Bathurst, NSW 2795, Australia
[7] Charles Sturt Univ, Sch Comp Math & Engn, Albury, NSW 2640, Australia
[8] QuintessenceLabs Pty Ltd, Canberra, ACT 2609, Australia
关键词
Security; Computer crime; Standards; Certification; Australia; Sun; Market research; Common criteria; cyber security; protection profile; security standard and certification; trusted system; KEY MANAGEMENT; CYBERSECURITY;
D O I
10.1109/ACCESS.2022.3168716
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in emerging Information and Communications Technology (ICT) technologies push the boundaries of what is possible and open up new markets for innovative ICT products and services. The adoption of ICT products and systems with security properties depends on consumers' confidence and markets' trust in the security functionalities and whether the assurance measures applied to these products meet the inherent security requirements. Such confidence and trust are primarily gained through the rigorous development of security requirements, validation criteria, evaluation, and certification. The Common Criteria for Information Technology Security Evaluation (often referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for cyber security. Motivated by encouraging the adoption of the CC that is used for ICT security evaluation and certification, in this paper, we conduct a systematic review of the CC standard and its adoptions. Adoption barriers of the CC are investigated based on the analysis of current trends in cyber security evaluation. In addition, we share the experiences and lessons gained through the recent Development of Australian Cyber Criteria Assessment (DACCA) project on the development of the Protection Profile that defines security requirements with the CC. Best practices, challenges, and future directions on defining security requirements for trusted cyber security advancement are presented.
引用
收藏
页码:44756 / 44777
页数:22
相关论文
共 50 条
  • [41] A NETWORK SECURITY EVALUATION MODEL BASED ON COMMON CRITERIA
    Wu, Xiao-Hua
    Li, Jian-Pin
    Yao, Wang
    2008 INTERNATIONAL CONFERENCE ON APPERCEIVING COMPUTING AND INTELLIGENCE ANALYSIS (ICACIA 2008), 2008, : 416 - 420
  • [42] Analyse of the security architecture and policy model in the Common Criteria
    Shi H.
    Gao J.
    Jia W.
    Liu H.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2016, 56 (05): : 493 - 498
  • [43] Formal Security Policy Model for a Common Criteria evaluation
    Park, Junkil
    Choi, Jin-Young
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 277 - +
  • [44] Logistic regression as a tool for defining habitat requirements of two common gammarids
    Peeters, ETHM
    Gardeniers, JJP
    FRESHWATER BIOLOGY, 1998, 39 (04) : 605 - 615
  • [45] CRITERIA FOR IT-SECURITY - THEIR IMPORTANCE FOR PRACTICAL APPLICATIONS
    KERSTEN, H
    WIRTSCHAFTSINFORMATIK, 1992, 34 (04): : 378 - 390
  • [46] Challenges of accurately defining the nutrient requirements of heat-stressed poultry
    Balnave, D
    POULTRY SCIENCE, 2004, 83 (01) : 5 - 14
  • [47] Defining and simulating open-ended novelty: requirements, guidelines, and challenges
    Wolfgang Banzhaf
    Bert Baumgaertner
    Guillaume Beslon
    René Doursat
    James A. Foster
    Barry McMullin
    Vinicius Veloso de Melo
    Thomas Miconi
    Lee Spector
    Susan Stepney
    Roger White
    Theory in Biosciences, 2016, 135 : 131 - 161
  • [48] Defining and simulating open-ended novelty: requirements, guidelines, and challenges
    Banzhaf, Wolfgang
    Baumgaertner, Bert
    Beslon, Guillaume
    Doursat, Rene
    Foster, James A.
    McMullin, Barry
    de Melo, Vinicius Veloso
    Miconi, Thomas
    Spector, Lee
    Stepney, Susan
    White, Roger
    THEORY IN BIOSCIENCES, 2016, 135 (03) : 131 - 161
  • [49] Quality Needs Structure: Industrial Experiences in Systematically Defining Software Security Requirements
    Fruhwirth, Christian
    Mordinyi, Richard
    SOFTWARE QUALITY: PROCESS AUTOMATION IN SOFTWARE DEVELOPMENT, 2012, 94 : 217 - +
  • [50] Vehicular Networks Security: Attacks, Requirements, Challenges and Current Contributions
    Tchepnda, Christian
    Moustafa, Hassnaa
    Labiod, Houda
    Bourdon, Gilles
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2009, 1 (01) : 39 - 52