Title
Security Objectives within a Security Testing Case Study
Abstract
Obviously, there is a need for automated information security analysis, validation, evaluation and testing approaches. Unfortunately, there is no state-of-art approach to carrying out information security evaluation in a systematic way. Information security evaluation of software-intensive and telecommunications systems typically relies heavily on the experience of the security professionals. Requirements are within the focus of the information security evaluation process. Information security requirements can be based on iterative risk, threat and vulnerability analyses, and technical and architectural information. There is a need for more practical ways to carry out this iterative process. In this paper we discuss security evaluation process, security objectives and security requirements from the basis of the experiences of a security testing project.
Year
DOI
Venue
2007
10.1109/ARES.2007.136
ARES
Keywords
Field
DocType
security evaluation process,information security requirement,security objectives,security testing case study,security professional,security objective,security requirement,architectural information,information security evaluation,information security evaluation process,automated information security analysis,security testing project,information analysis,security testing,information security,system testing,computer bugs,protocols,manufacturing industries,risk analysis,vulnerability analysis
Security convergence,Security testing,Asset (computer security),Computer security,Computer science,Security service,Information security management,Cloud computing security,Security information and event management,Computer security model
Conference
ISBN
Citations 
PageRank 
0-7695-2775-2
3
0.64
References 
Authors
1
4
Name
Order
Citations
PageRank
Kaarina Karppinen1335.62
Reijo Savola231835.00
Mikko Rapeli330.64
Esa Tikkala430.64