Applying the dod goal security architecture as a methodology for the development of system and enterprise security architectures

被引:1
|
作者
Lowman, T [1 ]
Mosier, D [1 ]
机构
[1] Sci Applicat Int Corp, Mclean, VA 22102 USA
关键词
D O I
10.1109/CSAC.1997.646189
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many organizations have a need to conduct security assessments and develop security architectures. It was recognized that a structured approach is needed. The Department of Defense Goal Security Architecture (DGSA) was already developed through considerable effort by knowledgeable security professionals. Our approach was to tailor-the DGSA to fit many enterprise information system security profiles and meet the requirements of multiple organizations. This paper shows how the DGSA was applied across multiple program types, and demonstrate how, if can be used for a wide variety of security tasks.
引用
收藏
页码:183 / 193
页数:11
相关论文
共 50 条
  • [41] Cyber Security - Security strategy for distribution management system and security architecture considerations
    Vittor, Timothy R.
    Sukumara, T.
    Sudarsan, S. D.
    Starck, Janne
    2017 70TH ANNUAL CONFERENCE FOR PROTECTIVE RELAY ENGINEERS (CPRE), 2017,
  • [42] Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA (R)
    Burkett, Jason S.
    INFORMATION SECURITY JOURNAL, 2012, 21 (01): : 47 - 54
  • [43] Intelligent Enterprise Information Security Architecture based on Service Oriented Architecture
    Sun, Jianguang
    Chen, Yan
    2008 INTERNATIONAL SEMINAR ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, PROCEEDINGS, 2008, : 196 - 200
  • [44] Enterprise Architecture Facilitates Adopting Agile Development Methodologies into a DoD Acquisition
    Cagle, Rick
    2012 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2012, : 19 - 23
  • [45] Development of an intelligent information security evaluation indices system for an enterprise organization
    Ko, IS
    Lee, G
    Na, YJ
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2005, 3682 : 1029 - 1035
  • [46] A SSL VPN Design Method for Enterprise FMC Security System Development
    Jung, Hyun-mi
    Han, Kyung-su
    Lee, Gang-soo
    CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, 2011, 206 : 204 - 211
  • [47] Applying The Flask Security Architecture to Secure SoC Design
    Hategekimana, Festus
    Bobda, Christophe
    2017 IEEE 25TH ANNUAL INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES (FCCM 2017), 2017, : 198 - 198
  • [48] Applying Security within a Service-Oriented Architecture
    Primost, Stephen
    INFORMATION SECURITY JOURNAL, 2008, 17 (01): : 26 - 32
  • [49] The Saga Security System: A security architecture for open distributed systems
    Soshi, M
    Maekawa, M
    PROCEEDINGS OF THE SIXTH IEEE COMPUTER SOCIETY WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, 1997, : 53 - 58
  • [50] The Flask security architecture: System support for diverse security policies
    Spencer, R
    Smalley, S
    Loscocco, P
    Hibler, M
    Andersen, D
    Lepreau, J
    USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 123 - 139