{"title":"Assessment of security requirements for sensitive systems","authors":"N. Brown","doi":"10.1109/CSAC.1989.81043","DOIUrl":null,"url":null,"abstract":"Summary form only given. A methodology for using a risk assessment approach to determine security and control requirements for sensitive systems is described. The assessment considers two categories of risk criteria: (1) pervasive risk and (2) specific risk. The final risk measure (or score) is calculated from the overall assessed risk ratings and weight factors assigned to these criteria. The final risk measure is matched to a sensitivity level which is further matched to a baseline security requirements level (SRL). The SRL prescribes specific base-set security and control requirements for each sensitive system as determined by the organizational policy and procedures for security and integrity of automated systems. Security requirements associated with a particular sensitivity level and SRL are translated into application security and control requirements. These requirements then become system design specifications for the subject system.<<ETX>>","PeriodicalId":284420,"journal":{"name":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1989.81043","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Summary form only given. A methodology for using a risk assessment approach to determine security and control requirements for sensitive systems is described. The assessment considers two categories of risk criteria: (1) pervasive risk and (2) specific risk. The final risk measure (or score) is calculated from the overall assessed risk ratings and weight factors assigned to these criteria. The final risk measure is matched to a sensitivity level which is further matched to a baseline security requirements level (SRL). The SRL prescribes specific base-set security and control requirements for each sensitive system as determined by the organizational policy and procedures for security and integrity of automated systems. Security requirements associated with a particular sensitivity level and SRL are translated into application security and control requirements. These requirements then become system design specifications for the subject system.<>