Applying the dod goal security architecture as a methodology for the development of system and enterprise security architectures

被引:1
|
作者
Lowman, T [1 ]
Mosier, D [1 ]
机构
[1] Sci Applicat Int Corp, Mclean, VA 22102 USA
关键词
D O I
10.1109/CSAC.1997.646189
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many organizations have a need to conduct security assessments and develop security architectures. It was recognized that a structured approach is needed. The Department of Defense Goal Security Architecture (DGSA) was already developed through considerable effort by knowledgeable security professionals. Our approach was to tailor-the DGSA to fit many enterprise information system security profiles and meet the requirements of multiple organizations. This paper shows how the DGSA was applied across multiple program types, and demonstrate how, if can be used for a wide variety of security tasks.
引用
收藏
页码:183 / 193
页数:11
相关论文
共 50 条
  • [1] Enterprise Security Architecture: Mythology or Methodology?
    McClintock, Michelle
    Falkner, Katrina
    Szabo, Claudia
    Yarom, Yuval
    PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS (ICEIS), VOL 2, 2020, : 679 - 689
  • [2] Fujitsu enterprise security architecture
    Shiozaki, Tetsuo
    Okuhara, Masayuki
    Yoshikawa, Nobuo
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2007, 43 (02): : 153 - 158
  • [3] Fujitsu enterprise security architecture
    Shiozaki, Tetsuo
    Okuhara, Masayuki
    Yoshikawa, Nobuo
    Fujitsu Scientific and Technical Journal, 2007, 43 (02): : 153 - 158
  • [4] A novel architecture for an integrated enterprise network security system
    Thanudas B.
    Sreelal S.
    Cyril Raj V.
    Purnesh Sairam A.
    Gajmoti V.
    Joshi P.
    International Journal of Security and Networks, 2019, 14 (01): : 47 - 60
  • [5] A roadmap to the enterprise security architecture
    Kim, Young-Gab
    Kang, Seung-Seok
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2018, 123 : 47 - 48
  • [6] Enterprise Information Security Architecture A Review of Frameworks, Methodology, and Case Studies
    Oda, S. Michelle
    Fu, Huirong
    Zhu, Ye
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 333 - +
  • [7] Enterprise engineering, and security - Enterprise frameworks and architectures, and IA patterns
    Heaney, J
    Hybertson, DI
    Reedy, A
    Chapin, S
    Kirwan, M
    18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 293 - 294
  • [8] Methodology for security development of an electronic prescription system
    Niinimäki, J
    Savolainen, M
    Forsström, JJ
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 1998, : 245 - 249
  • [9] Cyber Security Framework for Enterprise System Development: Enhancing Domain Security Through ESM
    Farroha, Bassam S.
    Farroha, Deborah L.
    MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 924 - 929
  • [10] The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures
    Sommestad, Teodor
    Ekstedt, Mathias
    Holm, Hannes
    IEEE SYSTEMS JOURNAL, 2013, 7 (03): : 363 - 373