Show simple item record

dc.contributor.authorNguyen, Thuy D.
dc.contributor.authorIrvine, Cynthia E.
dc.date.accessioned2012-07-11T15:49:36Z
dc.date.available2012-07-11T15:49:36Z
dc.date.issued2008-04-01
dc.identifier.citation3rd International Conference on Information Warfare and Security (ICIW 2008)
dc.identifier.urihttps://hdl.handle.net/10945/7157
dc.description.abstractSuccess in information warfare will depend on resilient, reconstitutable cyber assets and the ability to assess and respond to attacks. A cornerstone of this success will be the ability of Information Assurance professionals to develop sound security requirements and determine the suitability of evaluated security products for mission-specific systems. Recognizing the pedagogical value of applying security evaluation criteria such as the Common Criteria (CC) to information security education, we recently introduced a graduate-level Computer Science course focusing on methodical security requirements engineering based on the CC. This course aims to provide students with an understanding of how security evaluation criteria can be used to specify system security objectives, derive security requirements from security objectives, establish life cycle and development processes, and provide an organizational framework for research and development. Although imperfect, the paradigmatic process of the CC provides a usable framework for in-depth study of various tasks relating to system requirements derivation and verification activities: system requirements elicitation, threat analysis, security objectives definition and security requirements expression. In-class discussions address fundamental security design principles and disciplines for information and software assurance (e.g., formal methods and life cycle management) as applied to security requirements derivation. Coverage of advanced CC topics includes high assurance evaluation, international and U.S. scheme interpretation processes, guidance for Protection Profile development, CC evaluation methodology, and composite evaluation. This paper describes the scope and design of a pilot course offering. Laboratory projects focus on the differences between security functional and assurance requirements, mock evaluation of a draft Protection Profile, examination of the interpretation process in the U.S. scheme, and development of a preliminary sketch of a Composed Assurance Package for a hypothetical composed target system that is suitable for use in operational environments requiring medium robustness. Lessons learned and planned refinements of course material and focus are also discussed.en_US
dc.publisherInternational Conference on Information Warfare and Security (ICIW 2008), April 2008, Omaha, Nebraska, USAen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleUse of Evaluation Criteria in Security Educationen_US
dc.typeArticleen_US
dc.contributor.departmentComputer Science (CS)
dc.subject.authorSecurity requirements engineeringen_US
dc.subject.authorsecurity evaluationen_US
dc.subject.authorsecurity educationen_US
dc.subject.authorinformation assuranceen_US
dc.description.distributionstatementApproved for public release; distribution is unlimited.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record