An Enterprise Level Security Requirements Specification Model

  • Authors:
  • Evan Anderson;Joobin Choobineh;Michael R. Grimaila

  • Affiliations:
  • Texas A&M University/ College Station, TX;Texas A&M University/ College Station, TX;Air Force Institute of Technology

  • Venue:
  • HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 07
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

A formal model of security requirements for enterprise information technology protection is developed. The model is based on set theory and represented using an Entity-Relationship diagram. Components of the model include high level business objectives and their criticality, business requirements and their utilization, resources and their characterization as protector or protected resources, controls and their effectiveness, threats, vulnerabilities, potential exploits, and the resulting impact. An example representation of a formal relationship is provided. The model provides a canonical representation of enterprise security, enables automation and hence rigorous analysis of the security cost and effectiveness, provides for completeness and consistency checking, and offers a means for what-if as well as comparative analysis of security readiness.