Information Systems Security Engineering: A Critical Component of the Systems Engineering Lifecycle
|
|
|
- Noreen Shelton
- 10 years ago
- Views:
Transcription
1 Information Systems Security Engineering: A Critical Component of the Systems Engineering Lifecycle James F. Davis University of Maryland University College 3501 University Blvd. East Adelphia, MD UMUC [email protected] ABSTRACT The purpose of this research paper is to illustrate the industrial and federal need for Information Systems Security Engineering (ISSE) in order to build Information Assurance (IA) into a system rather than the current costly practice of fixing systems after production. Extensive research was performed by collecting information from throughout the World Wide Web to include sites such as the National Security Agency s Homepage, the Information Assurance Technical Framework Homepage, the Workshop for Application of Engineering Principles to System Security Design, as well as many others. This research realized the following findings: (1) IA is dangerously left out of systems engineering processes; (2) a consortium from academia, industry and the federal government have formalized ISSE and its processes; (3) federally sponsored and industrially sponsored professional certifications exist for security engineers practicing ISSE; (4) ISSE, however, is not greatly used today due to a lack of understanding and a perceived high cost; (5) end-users are beginning to understand IA and are calling for more secure systems. This paper was written to illustrate a way forward, a method to bring ISSE to the frontlines of systems engineering and bring to life a notional concept of Designing for Security. This paper does not provide quantitative analyses as to the benefits of ISSE vs. the initial up front costs; however, further research should be accomplished in the future to address this. In conclusion, I recommend that ISSE must be identified as a critical component of the systems engineering lifecycle and be properly utilized to ensure that future products meet the IA demands of the end user. To achieve this, academia must build degree programs to educate ISSE and incorporate ISSE into existing degree programs; industry and the federal government must both embrace these principles and apply these techniques to their postproduction, active engineering as well as new program developments. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. SIGAda 2004, November 14-18, 2004, Atlanta, Georgia, USA. Copyright 2004 ACM /04/0011 $5.00. Categories and Subject Descriptors D.2.0 [Software Engineering]: General protection mechanisms, standards. General Terms Design, Security, Theory, Verification. Keywords IA, Assurance, Engineering, ISSE, Security 1. INTRODUCTION In September 2003, Mr. Eugene Spafford, Professor and Director, Purdue University Center for Education and Research in Information Assurance, stated during a testimony before the US Congress, it is clear that there is a large and growing problem with the security of our cyberinfrastructure, and that nowhere is this more apparent than in the computing systems used within the Federal government [15]. He continued to describe how alarming the trends are in the way software is produced, acquired, deployed, and then used [15]. In particular he focused on the concerns with Commercial Off-the Shelf software [15]. The problem Mr. Spafford is describing is the fact that there exists a severe lack of focus and understanding in regards to information assurance (IA) during software systems development. Although his testimony is in regards to software, the same applies to systems that incorporate hardware solutions as well. With respect to these trends of software development as well as the ever increasing system and software complexities of today, limited are the days of post hoc security, and enter the need for a systematic and secure approach to incorporate information assurance Information Systems Security Engineering (ISSE) [1]. As evidenced by Mr. Spafford s testimony as well as countless papers, research and discussions of which, a select few have been cited in the references that follow this document it is a well-known fact that there exists a severe lack of understanding regarding the risk of IA. The risk mentioned here refers to both the risk of including as well as excluding IA within a systems development. The risk of including IA is the budgetary, schedule and performance costs that IA could possibly place on a system. On the other hand, leaving IA out could bring about critical system failures due to system vulnerabilities which would then potentially reveal an enormous cost to repair, patch and cleanse the system. It is the mission of ISSE to balance these risks along 13
2 with others to ensure some acceptable level for the customer and/or end user [9]. The purpose of this research paper is to illustrate the industrial and federal need for ISSE in order to build IA into a system rather than the current costly practice of fixing systems after production. In particular, this paper will describe what ISSE is, how it is used today within academia, industry as well as the federal government and why it must be recognized and treated as a critical component of the systems engineering lifecycle. Finally, a challenge and roadmap will be presented to illustrate an approach to satisfying the need for ISSE within academia, industry and the federal government. 2. WHAT IS INFORMATION S SECURITY ENGINEERING? Historically, due to the ability to cheaply and easily deploy a system with limited to no IA capabilities and thus provide a greater amount of features, convenience and performance that consumers demand, IA has typically been left out of the development processes to be integrated in post hoc, i.e., after production [1]. This method has since been accepted as common practice, however, the ability to accurately and efficiently counter all of the inherent vulnerabilities of a system, post production, is extremely difficult and costly (Cowen et al.). Thus, the growing need for IA directly conflicts with these current practices [1,15]. This growing need requires a revolution in the methods that IA is conceived, applied and endorsed. The proper application of ISSE to a systems engineering process is one of the results of this revolution. In summary and for the purposes of this paper, ISSE is the systematic approach to building IA techniques and tools within a systems engineering process. Another common and more detailed definition in use today by the Information Assurance Technical Framework (IATF) a group of federal, industrial and educational communities brought together to raise IA issues and provide guidance for solving IA issues as well as the NSA defines ISSE as the art and science of discovering users information protection needs and then designing and making information systems, with economy and elegance, so they can safely resist the forces to which they may be subjected [9]. The commonality between these two definitions and the overall objective of ISSE is that IA must be addressed from the very beginning of a systems development and that IA is not only serve as a component engineering role, however it permeates throughout the systems engineering lifecycle to build the tools and techniques to satisfy the IA need of the system [9]. ISSE is applied to both an overall systems engineering process as well as component level and sub-component level engineering processes as required [9]. IA considerations must be provided during the earliest phases and throughout a systems engineering lifecycle such as when defining the overall need of a system, developing the concept of operations of a system, during requirements engineering, during system design, implementation and during other post production activities [9]. The IATF describes the application of ISSE through a generic systems engineering lifecycle and is best illustrated by figure 1 [9]. The IATF also provides a set of overarching principles for guiding ISSE: (1) Always maintain separation between the problem and solution; (2) Problem space is driven by the customer s need; (3) ISSE defines the solution space based on the problem space [9]. Thus ISSE is much more than the current reactive approach to security by applying fixes, the goal here is to proactively apply IA to systems to prevent the need for theses fixes. DISCOVER NEEDS DEFINE REQUIREMENTS USERS/USERS REPRESENTATIVES DESIGN ARCHITECTURE DEVELOP DETAILED DESIGN ASSESS EFFECTIVENESS IMPLEMENT iatf_3_1_3001 Figure 1 - The generic systems engineering framework from which the NSA sponsored IATF (2002) builds the ISSE processes from as extracted from Chapter 3 of the IATF [9]. 3. HOW IS ISSE BEING USED TODAY ISSE, although growing in demand and popularity, is currently only being sporadically used and when used is not being applied correctly or throughout a systems engineering process. Due to the increased upfront cost of applying ISSE early on to an engineering process and the end user s inability to correctly realize the potential future costs of skipping out on IA both in terms of maliciously identified faults as well as the application of post hoc security the motivation and demand for ISSE is severely limited [1]. However, as the federal government continuously strives to improve its IA awareness and use, this will hopefully lead the way as an example for industry and academia. 3.1 ISSE within the Federal Government The federal government is actively utilizing ISSE, for example the NSA provides ISSE support to government systems engineering efforts as well as in support of Department of Defense system certification and accreditation processes [13]. The NSA also is the sponsoring agency of the IA Technical Framework (IATF), a document that, in great depth, defines what ISSE actually is [9]. The IATF is a product from a wide variety of persons throughout the federal, industrial and academic sectors [13]. Although additional improvements and changes will have to be made to further support ISSE development processes, the federal government is making progress and is moving to system-wide acceptance of ISSE. 3.2 ISSE within Industry Industry is realizing the need for systems security engineers as well [3]. Demand for security engineers and ISSE principles is rapidly growing in support of federal and commercial missions which in turn have been increasingly requesting security engineers and ISSE principles for systems engineering. This growing demand is a direct response to the continual lack of security with 14
3 regards to software applications development, network systems as well as many others [15]. Also a cause for this realization is that increasing residential bandwidth and access to global information repositories has led to IA failures and the need to apply more protection to systems, including home systems [2]. The use of network firewalls and other filter devices have spread to home users, virus software and the notion of secure software has also spread to residential neighborhoods. With this spread and increased awareness of IA, users have begun to demand better IA from the commercial world. Finally, with increasing systems complexities and thus cost to apply post hoc security, the application of ISSE principles and techniques are beginning to look much more appealing [1]. The growing demand for systems security engineers led to a lack of an ability to formally distinguish those persons that had the experience and expertise to perform ISSE functions vice those that did not. This lack of a formal ability to validate the skills of those personnel applying for positions to meet the demand of both industrial and federal ISSE positions led to federally sponsored certification programs via the International Information Systems Security Certification Consortium, Inc., also known as (ISC) 2 [5]. The formal ISSE development program, as established by the (ISC) 2 has become the industrial and federal standard for certifying systems security engineering professionals [6]. The certification track consists of a broad-based, limited depth of knowledge certification in Information Assurance, Certified Information Systems Security Professional (CISSP), as well as three different tracks of concentrated depth-based knowledge certifications: (1) Information Systems Security Engineering Professional (ISSEP); (2) Information Systems Security Architecture Professional (ISSAP); (3) and Information Systems Security Management Professional (ISSMP) [7]. These certification programs serve as basic credentials for persons desiring IA careers both within federal and industrial markets. 3.3 ISSE within Academia Academia s response to the need for IA awareness and education has been broadened by federal ventures such as the NSA s National IA Education & Training Program (NIETP) [14]. This program builds governmental, industrial and academia partnerships to advocate IA education and awareness [14]. The NIEPT s direct partnership with colleges and universities is via another program called the NSA s National Centers of Academic Excellence in Information Assurance Education (CAEIAE) [11]. Within the CAEIAE program, universities and colleges may apply for certification-type lauds from the NSA and be recognized as a Center of Academic Excellence that then enables students of those universities and colleges to be eligible for federal scholarships and grants, such as the Department of Defense Information Assurance Scholarship Program as well as others [11]. These programs represent just one aspect of growing IA education within academia, however, much more is needed to solidify and promote the overall ISSE principles of designing IA into a system rather than post hoc security [1]. Another academic response to the need for IA in current and future systems is the idea of Design for Securability, where the assumption is that no system can be designed secure; rather, the focus is on securing the system during its operation [4]. This concept greatly contradicts the ISSE approach in that the objective of ISSE is to do what this idea has stated as impossible [4,9]. In fact, the idea of Design for Securability calls for the implementation of design features during the operation of a system which still ends up producing a post hoc security solution [1,4]. However contradictory to ISSE, this critical analysis of different methods of securing a system is greatly needed as these analyses may potentially discover a better method to apply security solutions to a system. 4. ISSE: A CRITICAL COMPONENT OF THE ENGINEERING LIFECYLCE The systems engineering lifecycle is the evolution of a system or product with specific and identified phases that address need, development, test, production, operations, support and maintenance, as well as training and terminating at disposal of the system or product [8]. For example, DoD R framework incorporates a DoD standard for systems engineering lifecycles as does the IEEE , Standard for Application and Management of the Systems Engineering Process, both of which are illustrated in the IATF appendix J [9]. The ISSE lifecycle is designed to fit perfectly within a systems engineering lifecycle and is also illustrated in the IATF and the same appendices [9]. Due to the nature of IA and how it permeates throughout an information system s design and implementation, ISSE must be considered more than a component engineering discipline and rather as a critical attribute and function of the overall systems engineering lifecycle [9]. In contrast to the standard component engineering disciplines such as Software Engineering, Civil Engineering, etc., ISSE does not only provide products to satisfy system-level requirements, rather ISSE provides both products and guidance for other component engineering disciplines during the systems engineering lifecycle [9]. For example, ISSE is responsible for engineering specific IA products in support of the overall system, such as: cryptography devices, key management services for the cryptography, etc [9]. ISSE is also responsible to provide constraints and guidance in regards to the methods that component disciplines build their products, such as building a component to meet certain IA certification guidelines or restricting the types of personnel that are authorized to work on a product (i.e., US only, persons/organizations with a certain amount of known trust, or persons/organizations who hold certain certifications such as ISO 9000 or Capability Maturity Model Indices) [9]. ISSE must also be integrated into a systems engineering lifecycle from the beginning as it plays a critical role in facilitating systemlevel requirements, design and analyses [9]. The ISSE process, as captured by the IATF, is intimately involved within every phase of the systems engineering lifecycle [9]. For example, during a standard DoD R systems engineering lifecycle s requirements analysis phase, ISSE is defining system security requirements and in particular, developing a systems security concept of operations, defining the IA boundaries for the system as well as much more [9]. 5. ISSE AND ITS IMPACT ON LIFECYCLE COSTS Although the upfront cost of performing the tasks of ISSE during a systems engineering lifecycle may seem great due to uncertainty and time or budget constraints, the cost if compared to applying 15
4 the security, changing system designs and possibly rebuilding components post hoc is extremely low [1]. In fact, if ISSE is properly utilized from the beginning of a systems engineering process, ISSE may provide additional benefits such as identifying and mitigating system risk in regards to cost, schedule and performance earlier on and thus further enhance a system s ability to remain on target [9]. However, due to the extreme difficulty of properly measuring IA effectiveness and because IA is not always a black box that can be engineered, procured and just simply placed on a system and expected to solve all IA worries, it is extremely difficult to warrant the need of ISSE without stating just because or relying on corporate or governmental regulations. 6. RECOMENDATIONS In order to build IA into today s systems, the current, most systematic and cost effective method is ISSE. ISSE must be identified as a critical component of the systems engineering lifecycle and be properly utilized to ensure that future products meet the IA demands of the end user. To do this, we must build security engineers from the ground up. Academia must provide degree programs for ISSE as well as incorporate ISSE principles in current component level and system level degree programs such as Systems Engineering, Software Engineering, etc. Through this education process, engineers, customers and the end users will realize the current methods of cost analysis regarding IA are extremely flawed and will be able to better analyze the IA need with respect to their constraints. By building ISSE and ISSE aware personnel from the ground up, future programs will be able to withstand the current and ever growing threat to IA. Due to the latency of academics reaching industry, it is imperative that ISSE principles and tasks be incorporated into today s systems engineering processes as well. Spinning up ISSE educated experts will take time, so a solution to the ISSE gap must be identified. The recommended solution to this is to incorporate the (ISC) 2 certification processes as a guide to building top down security engineers. This would provide both a means to measure person s capabilities as well as provide a structured guide to understanding ISSE and thus fill the academiato-industry transfer gap. 7. CONCLUSION In conclusion, there exists a fundamental need for ISSE within the overarching systems engineering process for federal, industrial as well as academic purposes [15]. The purpose of this paper was to illustrate this need by defining what ISSE is, how it is in use today by federal, corporate and academic worlds as well as to discuss why it must be treated as a critical component of the systems engineering lifecycle. As Mr. Spafford stated the need for IA within software development processes and as post hoc security becomes more impractical, the need for ISSE becomes unmistakable [1]. As the systematic approach to building and incorporating IA principles, techniques and solutions into a systems engineering process, ISSE is the foundational IA process to protect current and future information systems and must be accepted as such [9]. Without the system level security engineering, systems will continue to be developed that must incorporate post hoc security as a major portion of their maintenance phase of their lifecycles [1]. As was illustrated in this paper, this form of applying IA solutions is extremely costly and increasingly difficult as systems and software increase in complexity [1]. Another concern with post hoc security or poorly implemented component-centric ISSE is the possibility that a system-level defined process may be the root cause of an IA failure, however, due to the lack of IA focus at the system-level, this failure is not realized until testing or possibly even implementation of the system [1]. To make a correction of this magnitude would cost an incredible amount of time and money. The paramount principle of ISSE is that security engineering is done from the system-level and spiraled into the components in concert with the developmental lifecycle [9]. As is evidenced in academia, industry as well as the federal government, ISSE principles are beginning to plant roots and build their foundation from which to build on. The NSA s drive of boosting IA awareness via the CAEIAE program & IATF Forum is a major player in the world of security engineering. The results of the CAEIAE program are evident as 50 colleges and universities have been certified by the NSA as Centers of Academic Excellence. Industry has also taken notice as the demand for security engineers begins to quickly rise and security concerns flow to the general civilian populace. For instance, due to the increasing bandwidth to the residential users, more and more users are utilizing firewalls or other Internet security mechanisms a clear sign that IA awareness is spreading [2]. Finally, the way forward; how do we protect the systems that have already been designed and implemented, those in their maintenance phases; what about those systems that are just starting up; and those that are nearing a critical design milestone. We must embrace the principles of ISSE and make use of the academics available now, utilize certification processes to provide structured training and then integrate those ISSE principles within every phase of a systems lifecycle. A formalized and baselined set of ISSE principles is publicly available as chapter 3 and appendix J of the NSA s IATF [9]. The tools, techniques, knowledge and training is available; get it, learn it, do it, be an IA aware engineer or an Information Systems Security Engineer 8. ACKNOWLEDGMENTS My thanks to the University of Maryland University College s Professor Louis Blazy for his assistance and teachings during his Spring 2004 Systems Engineering course for which this paper was originally written. 9. REFERENCES [1] Cowan, C., Hinton, H., Pu, C., & Walpole, J. (2000, October). The Cracker Patch Choice: An Analysis of Post Hoc Security Techniques. Presented at the National Information Systems Security Conference, Baltimore, MD. Retrieved April 4, [2] Entman, R. M. (1999). Residential Access to Bandwidth: Exploring New Paradigms. Washington, DC: Communications and Society Program. Retrieved April 23, cess.pdf 16
5 [3] Google Inc. Google Search For Systems Security Engineer. Retrieved April 23, 8&oe=UTF-8&q=%22systems+security+engineer%22+ [4] Hunstad, A., & Hallberg, J. (2002, November). Design for securability -- Applying engineering principles to the design of security architectures. Presented at the ACSA Workshop on the Application of Engineering Principles to System Security Design. Retrieved February 22, [5] International Information Systems Security Certification Consortium, Inc. (ISC) 2. (2004, April). (ISC) 2 And Booz Allen Hamilton Present Preview Of New NSA-Sponsored Certification. (ISC) 2 Press Releases. Retrieved April 11, [6] International Information Systems Security Certification Consortium, Inc. (ISC) 2. About (ISC) 2. Retrieved April 11, [7] International Information Systems Security Certification Consortium, Inc. (ISC) 2. Frequently Asked Questions. Retrieved April 11, [8] Kossiakoff, A., & Sweet, W. N. (2003). Systems Engineering Principles and Practice (pp ). Hoboken, NJ: John Wiley & Sons, Inc. [9] National Security Agency. (2002, September). Information Assurance Technical Framework Release 3.1. Fort Meade, MD: Author. Retrieved April 23, 3_1/zipfile.cfm?chapter=version-3_1 [10] National Security Agency. (2003, December). Information Systems Security Engineer Professional (ISSEP). Las Vegas, NV: 2003 Annual Computer Security Applications Conference. Retrieved February 22, [11] National Security Agency. Centers of Academic Excellence. Fort Meade, MD: Author. Retrieved April 23, [12] National Security Agency. Centers of Academic Excellence: Institutions. Fort Meade, MD: Author. Retrieved April 23, [13] National Security Agency. Information Systems Security Engineering. Fort Meade, MD: Author. Retrieved April 23, [14] National Security Agency. National IA Education & Training Program. Fort Meade, MD: Author. Retrieved April 23, [15] Spafford, E. H. (2003, September). Exploring Common Criteria: Can it Ensure that the Federal Government Gets Needed Security in Software? Washington, DC: Testimony before the House Government Reform Committee Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census. Retrieved February 22, 17
Information Systems Security Engineering Professional (ISSEP)
Information Systems Security Engineering Professional (ISSEP) 1 Presentation Outline What is ISSE Why ISSEP Development of the ISSEP Concentration Content Certification Specifics 2 Systems Security Engineering
An Information Assurance and Security Curriculum Implementation
Issues in Informing Science and Information Technology Volume 3, 2006 An Information Assurance and Security Curriculum Implementation Samuel P. Liles and Reza Kamali Purdue University Calumet, Hammond,
Certification for Information System Security Professional (CISSP)
Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.
Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
December 14, 2007. Sincerely, Charles T. Follin, PMP President. Page 1 of 5
December 14, 2007 Department of Transportation Federal Transit Administration Federal Transit Administration HQ Attn: Mr. John Bardwell 1200 New Jersey Avenue, SE Washington, DC 20590 Reference: Reference
Access FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at [email protected]. To speak with a Help Desk
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
The HIPAA Security Rule: Theory and Practice
Presentation for HIPAA Summit X Baltimore, MD April 7, 2005 The HIPAA Security Rule: Theory and Practice Sam Jenkins Privacy Officer TRICARE Management Activity (TMA) Dan Steinberg Senior Consultant Booz
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
AC 2010-741: ASSOCIATE SYSTEMS ENGINEERING PROFESSIONAL (ASEP) CERTIFICATION: A CREDENTIAL TAILORED FOR STUDENTS AND JUNIOR ENGINEERS
AC 2010-741: ASSOCIATE SYSTEMS ENGINEERING PROFESSIONAL (ASEP) CERTIFICATION: A CREDENTIAL TAILORED FOR STUDENTS AND JUNIOR ENGINEERS Steve Walter, Indiana University-Purdue University, Fort Wayne Dr.
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Security Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]
Security Considerations for the Spiral Development Model
Security Considerations for the Spiral Development Model Loye Lynn Ray University of Maryland University College 3501 University Blvd East Adelphi, MD 20783 [email protected] 717-718-5727 Abstract
IT Security. Securing Your Business Investments
Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information
Is Penetration Testing recommended for Industrial Control Systems?
Is Penetration Testing recommended for Industrial Control Systems? By Ngai Chee Ban, CISSP, Honeywell Process Solutions, Asia Pacific Cyber Security Assessment for Industrial Automation Conducting a cyber-security
Information Systems Security Certificate Program
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE SCIENCE, SPACE AND TECHNOLOGY COMMITTEE SUBCOMMITTEE
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
The Economic Benefit of Cloud Computing
The Economic Benefit of Cloud Computing An NJVC and Clear Government Solutions Executive White Paper Kevin L. Jackson General Manager, Cloud Services, NJVC Robert Williams President, Clear Government Solutions
ReMilNet Service Experience Overview
ReMilNet Service Experience Overview ReMilNet s knowledge across all functional service areas enables us to provide qualified personnel with knowledge across the spectrum of support services. This well
Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs
Technology Lifecycle Management A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Even as technology improves, government s fundamental IT challenge remains
Introduction to Modeling and Simulation. Certification. Osman Balci Professor
Introduction to ing and Certification Osman Balci Professor Department of Computer Science Virginia Polytechnic Institute and State University (Virginia Tech) Blacksburg, VA 24061, USA http://manta.cs.vt.edu/balci
Information Technology Security Certification and Accreditation Guidelines
Information Technology Security Certification and Accreditation Guidelines September, 2008 Table of Contents EXECUTIVE SUMMARY... 3 1.0 INTRODUCTION... 5 1.1 Background... 5 1.2 Purpose... 5 1.3 Scope...
Army Regulation 702 11. Product Assurance. Army Quality Program. Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED
Army Regulation 702 11 Product Assurance Army Quality Program Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED SUMMARY of CHANGE AR 702 11 Army Quality Program This major
CMS Information Security Risk Assessment (RA) Methodology
DEPARTMENT OF HEALTH & HUMAN SERVICES Centers for Medicare & Medicaid Services 7500 Security Boulevard, Mail Stop N2-14-26 Baltimore, Maryland 21244-1850 CENTERS FOR MEDICARE & MEDICAID SERVICES (CMS)
The Value of Information Security Certifications
The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials
In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66) Terry Halvorsen DoD CIO
A Department of Defense Report on the National Security Agency and Department of Homeland Security Program for the National Centers of Academic Excellence in Information Assurance Education Matters In
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
Software Application Control and SDLC
Software Application Control and SDLC Albert J. Marcella, Jr., Ph.D., CISA, CISM 1 The most effective way to achieve secure software is for its development life cycle processes to rigorously conform to
Private Vs Public Cloud
Private Vs Public Cloud Solanke Vikas 1, Kulkarni Gurudatt 2, Maske Vishnu 3, Kumbharkar Prashant 4 1 Lecturer in Information Technology Department,MM Polytechnic Pune, India [email protected]
The GW CyberCorps Program
The GW CyberCorps Program www.seas.gwu.edu/cybercorps Introduction The need for educated personnel in the government s cyber security workforce is critical to the nation s security. As evidenced by remarks
ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE
ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality
U.S. Dept. of Defense Systems Engineering & Implications for SE Implementation in Other Domains
U.S. Dept. of Defense Systems Engineering & Implications for SE Implementation in Other Domains Mary J. Simpson System Concepts 6400 32 nd Northwest, #9 Seattle, WA 98107 USA Joseph J. Simpson System Concepts
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Security aspects of e-tailing. Chapter 7
Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing
How To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
The Nature of Cyber Security. Eugene H. Spafford
The Nature of Cyber Security Eugene H. Spafford Presented as Keynote #2 at WORLDCOMP'11 The 2011 World Congress in Computer Science, Computer Engineering, and Applied Computing The Monte Carlo Resort and
An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/
An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at
Proven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
Research on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
Statement. Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation. Before
Statement of Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation Before THE UNITED STATES SENATE ARMED SERVICES COMMITTEE (SUBCOMMITTEE ON READINESS AND MANAGEMENT SUPPORT)
Information Security Risk Management
Information Security Risk Management Based on ISO/IEC 17799 Houman Sadeghi Kaji Spread Spectrum Communication System PhD., Cisco Certified Network Professional Security Specialist BS7799 LA [email protected]
Best Practices for the Acquisition of COTS-Based Software Systems (CBSS): Experiences from the Space Systems Domain
GSAW 2004 Best Practices for the Acquisition of COTS-Based Software Systems (CBSS): Experiences from the Space Systems Domain Richard J. Adams and Suellen Eslinger Software Acquisition and Process Office
Information Security Workforce Development Matrix Initiative. FISSEA 23 rd Annual Conference March 23, 2010
Information Security Workforce Development Matrix Initiative FISSEA 23 rd Annual Conference March 23, 2010 Professionalization of the Workforce The CIO Council s IT Workforce Committee partnered with Booz
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE
DRAFT REGULATORY GUIDE
U.S. NUCLEAR REGULATORY COMMISSION August 2012 OFFICE OF NUCLEAR REGULATORY RESEARCH Division 1 DRAFT REGULATORY GUIDE Contact: K. Sturzebecher (301) 251-7494 DRAFT REGULATORY GUIDE DG-1206 (Proposed Revision
National Information Assurance Education and Training Program
National Information Assurance Education and Training Program http://www.nsa.gov/isso/programs/nietp/index.htm Sherry Borror [email protected] INFOSEC Training and Education Documented Need Partnerships
Developing Greater Professionalism in GIS Project Management
Bill Haaker Senior Project Manager ASI Technologies 1935 Jamboree Drive Colorado Springs, CO 80920 Developing Greater Professionalism in GIS Project Management Introduction Project management is widely
Information Systems Security Line of Business (ISS LoB)
Information Systems Security Line of Business (ISS LoB) Information Security and Privacy Advisory Board George Washington University Washington, DC March 22, 2007 Agenda Background Status Next Steps Background
Security-as-a-Service (Sec-aaS) Framework. Service Introduction
Security-as-a-Service (Sec-aaS) Framework Service Introduction Need of Information Security Program In current high-tech environment, we are getting more dependent on information systems. This dependency
Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper
Vulnerability Audit: Why a Vulnerability Scan Isn t Enough White Paper May 10, 2005 TABLE OF CONTENTS Introduction: How Secure Are My Systems?... 3 Vulnerability: The Modern Meaning Of A Muddled Word...
SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
PHASE 9: OPERATIONS AND MAINTENANCE PHASE
PHASE 9: OPERATIONS AND MAINTENANCE PHASE During the Operations and Maintenance Phase, the information system s availability and performance in executing the work for which it was designed is maintained.
AD Management Survey: Reveals Security as Key Challenge
Contents How This Paper Is Organized... 1 Survey Respondent Demographics... 2 AD Management Survey: Reveals Security as Key Challenge White Paper August 2009 Survey Results and Observations... 3 Active
In today s acquisition environment,
4 The Challenges of Being Agile in DoD William Broadus In today s acquisition environment, it no longer is unusual for your program to award a product or service development contract in which the vendor
Information Technology
May 7, 2002 Information Technology Defense Hotline Allegations on the Procurement of a Facilities Maintenance Management System (D-2002-086) Department of Defense Office of the Inspector General Quality
How To Integrate Software And Systems
September 25, 2014 EFFECTIVE METHODS FOR SOFTWARE AND SYSTEMS INTEGRATION P R E S E N T E D B Y: D R. B O Y D L. S U M M E R S 1 Software Engineer (Quality) Defense and Space The Boeing Company - Seattle,
National Information Assurance Certification and Accreditation Process (NIACAP)
NSTISSI No. 1000 April 2000 National Information Assurance Certification and Accreditation Process (NIACAP) THIS DOCUMENT PROVIDES MINIMUM STANDARDS. FURTHER INFORMATION MAY BE REQUIRED BY YOUR DEPARTMENT
Software Development Process
Software Development Process A software development process, also known as software development lifecycle, is a structure imposed on the development of a software product. Similar terms include software
A Report on The Capability Maturity Model
A Report on The Capability Maturity Model Hakan Bayraksan hxb07u 29 November 2009 G53QAT Table of Contents Introduction...2 The evolution of CMMI...3 CMM... 3 CMMI... 3 The definition of CMMI... 4 Level
Risk Management Primer
Risk Management Primer Purpose: To obtain strong project outcomes by implementing an appropriate risk management process Audience: Project managers, project sponsors, team members and other key stakeholders
Microsoft Solutions for Security. Delivering the Windows Server 2003 Security Guide
Microsoft Solutions for Security Delivering the Windows Server 2003 Security Guide Information in this document, including URL and other Internet Web site references, is subject to change without notice.
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
A Detailed Strategy for Managing Corporation Cyber War Security
A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait [email protected] ABSTRACT Modern corporations
Technical Writing - A Review of Agile Software Development Services
Enchantment Chapter Monthly Meeting 10 June, 2015 4:45-6:00 pm: Systems Engineering for Software Intensive Projects using Agile Methods Larri Rosser, Raytheon Intelligence, Information & Services, Sr.
Security Engineering Best Practices. Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 [email protected].
Tutorial: Instructor: Topics: Biography: Security Engineering Best Practices Karen Ferraiolo, Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 [email protected] This tutorial
PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE:
PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: Project Name Project Management Plan Document Information Document Title Version Author Owner Project Management Plan Amendment History
Enterprise Frameworks: Guidelines for Selection
Enterprise Frameworks: Guidelines for Selection Mohamed E. Fayad, University of Nebraska, Lincoln David S. Hamu, TRW [email protected], [email protected] An Enterprise Framework (EF) is a software architecture.
DEFENSE ACQUISITION WORKFORCE
United States Government Accountability Office Report to Congressional Committees December 2015 DEFENSE ACQUISITION WORKFORCE Actions Needed to Guide Planning Efforts and Improve Workforce Capability GAO-16-80
The Role of CM in Agile Development of Safety-Critical Software
The Role of CM in Agile Development of Safety-Critical Software Tor Stålhane1, Thor Myklebust 2 1 Norwegian University of Science and Technology, N-7491, Trondheim, Norway 2 SINTEF ICT, Strindveien 2,
Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.
Executive Summary Statement of Nadya Bartol Vice President, Industry Affairs and Cybersecurity Strategist Utilities Telecom Council Before the Subcommittee on Oversight and Subcommittee on Energy Committee
Software Engineering: Reflections on an Evolving Discipline
70 International Journal of Information Systems and Software Engineering for Big Companies (IJISEBC) Software Engineering: Reflections on an Evolving Discipline Ingeniería de software: Reflexiones sobre
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT
Energy Research and Development Division FINAL PROJECT REPORT CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT Prepared for: Prepared by: California Energy Commission KEMA, Inc. MAY 2014 CEC
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Information Technology Engineers Examination
Information Technology Engineers Examination Outline of ITEE Ver 2.1 November 30, 2015 The company and products names in this report are trademarks or registered trademarks of the respective companies.
DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process
Inspector General U.S. Department of Defense Report No. DODIG-2015-045 DECEMBER 4, 2014 DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process INTEGRITY EFFICIENCY ACCOUNTABILITY
Skatteudvalget 2014-15 (2. samling) SAU Alm.del Bilag 48 Offentligt. Programme, Project & Service Management Analysis
Skatteudvalget 2014-15 (2. samling) SAU Alm.del Bilag 48 Offentligt Programme, Project & Service Management Analysis Table of Content 1 Executive Summary... 3 1.1 Scope of Work... 3 1.2 Methodology for
