40
Information Systems Security Design Methods: Implications for Information Systems Development RICHAFID BASKERVILLE School of Management, Binghamton Uruuerszty, Binghamton, New York 13901 The security of information systems is a serious issue because computer abuse is increasing. It is important, therefore, that syst ms analysts and designers develop expertise in methods for specifying information systems security. The characteristics found m three generations of general information system design methods p ovide a framework for comparing and understanding current security desi n me hods. These methods include approaches that use checklists of controls, divide functional requirements into engineering partitions, and create abstract models of both the problem and the solution. Comparisons and contrasts reveal that advances in security methods lag behind advances in general systems development methods. This analysls also reveals that more general methods fail to consider security specifications rigorously. Categories and Subject escriptors: C.O [Computer Systems Organization]: General systems specifLcatzon methodology; H. 1.1 [Information Systems]: Systems and Information Theoryualue of mformatzorz; H. 1.2 [Information Systems]: User/Machine Systemshum n factors; K.6.1 [Management of Computing and Information Systems]: Project and People Managementsysterns and analysw and deszgn; K.6.5 [Management of Computing and Information Systems]: Security and Protectionauthentication; znsurance; inuasz(,e software: phystcal securzt.y General Terms: Management, Security Additional Key Words and Phrases: Checkhsts, control, integrity, risk an lysis, safety, structured systems analysis and design, system modeling INTRO[)UCTION Most designers do not intentionally set out to design an information system that is unsafe or insecure. Yet research into specification methods for the analysis and design of information systems security often seems esoteric and remote. The purpose of this article, therefore, is to provide an analytical description of the evolutllon of information systems (1S) securif~y analysis and design methods. To malke this description interesting to a broad audience, we will approach these methods by comparing them with more general information systems deve - opment methods. In this way, we can understand the current techniques for creating safe computing resources and recognize critical avenues for new research in general systems devel pment methods. Importance of Security The gravity of the systems security issue is reflected in widely known studies of computer abuse [Parker 1976; White side 1978; BloomBecker 1990], computer viruses [Fites et al. 1989; Hruska 1990], and il egitimate computer hacking or cracking [Landreth 1989; Stoll 1989; Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the pubhcatlo and its date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republis , requires a fee and/or specific permission. G 1993 ACM 0360-0300/93/1200-0375 $03.50 ACM Computmg Surveys, Vol 25, No 4, December 1993

baskerville risk management

Embed Size (px)

Citation preview

Page 1: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 1/40

Page 2: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 2/40

Page 3: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 3/40

Page 4: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 4/40

Page 5: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 5/40

Page 6: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 6/40

Page 7: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 7/40

Page 8: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 8/40

Page 9: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 9/40

Page 10: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 10/40

Page 11: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 11/40

Page 12: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 12/40

Page 13: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 13/40

Page 14: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 14/40

Page 15: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 15/40

Page 16: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 16/40

Page 17: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 17/40

Page 18: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 18/40

Page 19: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 19/40

Page 20: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 20/40

Page 21: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 21/40

Page 22: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 22/40

Page 23: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 23/40

Page 24: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 24/40

Page 25: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 25/40

Page 26: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 26/40

Page 27: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 27/40

Page 28: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 28/40

Page 29: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 29/40

Page 30: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 30/40

Page 31: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 31/40

Page 32: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 32/40

Page 33: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 33/40

Page 34: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 34/40

Page 35: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 35/40

Page 36: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 36/40

Page 37: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 37/40

Page 38: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 38/40

Page 39: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 39/40

Page 40: baskerville risk management

8/7/2019 baskerville risk management

http://slidepdf.com/reader/full/baskerville-risk-management 40/40