Operational requirements for security measures

被引:0
|
作者
Spaight, WHT
机构
来源
34TH ANNUAL 2000 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS | 2000年
关键词
D O I
10.1109/CCST.2000.891169
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Many physical and procedural security measures have not met the users' needs because the implications of what is required have not been fully thought through. An Operational Requirement is a statement of needs based upon a thorough and systematic assessment of the problems to be solved and the hoped for outcomes. It should provide the link between a high level need and the system procurement process. It is easy to consider in principle but hard to develop in practice. The paper will explain the development of an Operational Requirement and give examples of where it has and has not been used. Examples will include the procurement of equipment and the procedures and numbers needed for a guarding regime.
引用
收藏
页码:64 / 70
页数:7
相关论文
共 50 条
  • [11] ON MEASUREMENT OF OPERATIONAL SECURITY
    BROCKLEHURST, S
    LITTLEWOOD, B
    OLOVSSON, T
    JONSSON, E
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 1994, 9 (10) : 7 - 16
  • [12] Operational Security - A Coming Evolution of Railway Operational Procedures Under the IT Security Threat
    Huang, Po-Chi
    Milius, Birgit
    RELIABILITY, SAFETY, AND SECURITY OF RAILWAY SYSTEMS: MODELLING, ANALYSIS, VERIFICATION, AND CERTIFICATION, RSSRAIL 2016, 2016, 9707 : 69 - 78
  • [13] MICROCOMPUTER REQUIREMENTS IN THE OPERATIONAL NAVY
    MOY, MC
    BEHAVIOR RESEARCH METHODS INSTRUMENTS & COMPUTERS, 1984, 16 (02): : 189 - 192
  • [14] OPERATIONAL REQUIREMENTS AND PACS DESIGN
    COWAN, M
    GLOVER, R
    BRITISH JOURNAL OF RADIOLOGY, 1985, 58 (692): : 800 - 800
  • [15] BPMN Profile for Operational Requirements
    Bock, Conrad
    Barbau, Raphael
    Narayanan, Anantha
    JOURNAL OF OBJECT TECHNOLOGY, 2014, 13 (02): : 1 - 35
  • [17] A Security Ontology for Security Requirements Elicitation
    Souag, Amina
    Salinesi, Camille
    Mazo, Raul
    Comyn-Wattiau, Isabelle
    ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 157 - 175
  • [18] Security measures
    Nisley, E
    DR DOBBS JOURNAL, 2005, 30 (02): : 69 - 71
  • [19] Security measures
    Wadman, Meredith
    NATURE, 2009, 461 (7264) : 577 - 577
  • [20] Identifying implied security requirements from functional requirements A replication on the use of security requirements templates
    Martinez, Andres
    Jenkins, Marcelo
    Quesada-Lopez, Christian
    2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2019,