skip to main content
10.1145/1940976.1940993acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

Non risk assessment information security assurance model

Published:25 September 2009Publication History

ABSTRACT

This article is present information assurance model based on Non risk assessment model. The model based on diligence model where assurance is achieved by using threat and vulnerability reviews and countermeasures based on tangible best practices. An information security program can be initiated based on one of three models: bench marks, risk assessment and diligence model. The article presents the three modules then adopts the last one to build information assurance security model based on layering levels.

References

  1. NIST National Institute of standard and technology. 1990 Computer Security Division, Computer Resource Center, Special Publications (800 Series) established in 1990, all documents can be retrieved from http://csrc.nist.gov/Google ScholarGoogle Scholar
  2. John Pike, NSA/NCSC Rainbow Series. 2006, Updated August February 6, 2006, Can be retrieved from http://www.fas.org/irp/nsa/rainbow.htmGoogle ScholarGoogle Scholar
  3. Commonwealth of Australia The Environmental Health Risk Assessment Provides Guidelines for Assessing Human Health Risks from Environmental Hazards, June 2004. Available from http://www.carers.health.gov.au/Google ScholarGoogle Scholar
  4. Stamatelatos, M. G. 2004. NASA Perspective on Risk Assessment Can be retrieved from http://www7.nationalacademies.orgGoogle ScholarGoogle Scholar
  5. C. Kreitner and B. Miuccio. 2001. The Center for Internet Security: Global Security Benchmarks for Computers Connected to the Internet Information Systems Control Journal, Volume 6, 2001, Can be retrieved from http://www.isaca.org/Google ScholarGoogle Scholar
  6. Donn B Parker. 2008. ACM Communication Forum, Feb 2008 Volume 51, No. 2Google ScholarGoogle Scholar
  7. Donn B Parker. 1998. Fighting Computer Crime: A New Framework for Protecting Information. Wiley; Subsequent edition (August 27, 1998) Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Donn B Parker. 2002. Toward a New Framework for Information Security Chapter 5 in Computer Security Handbook, Fourth Edition, Seymour Bosworth and M. E. Kabay (eds.), John Wiley & SonsGoogle ScholarGoogle Scholar
  9. Donn B Parker. 2007. "What's Wrong with Information Security and How to Fix It Thinking Outside of the Box," invited speaker InfoSecCD 2007, Kennesaw state university, Georgia.Google ScholarGoogle Scholar
  10. H. F. Tipton & K. Henry, (ed.). 2006. Official (ISC)2 Guide to the CISSP CBK, Auerbach; 2nd edition Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. ISO 17799-2005. 2005.International Organization for Standardization International Standards for Business, Government and Society, Can be retrieved from http://www.iso.org/Google ScholarGoogle Scholar
  12. ISO/IEC 27001:2005. 2005. Information Technology -- Security Techniques -- Information Security Management Systems, Retrieved from http://www.iso.org/Google ScholarGoogle Scholar
  13. Joseph Boyce and Daniel Jennings. 2002. Information Assurance: Managing Organizational IT Security Risks, Butterworth-Heinemann; 1st edition Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. C. Wood. 2005. Information Security Made Easy, Information Shield (2005) ISO 17799 Security Policy SolutionsGoogle ScholarGoogle Scholar
  15. ISO/IEC 27001:2005 Information technology -- Security techniques -- Information security management systems -- Requirements can be found in http://www.iso.org/iso/Google ScholarGoogle Scholar
  16. IEEE P 1700. (2008. ISSAA Standard; Version 21.0 Can be retrieved from http://issaa.org/Google ScholarGoogle Scholar
  17. IPS PUB 200 Minimum Security Requirements for Federal Information and Information Systems 2006Google ScholarGoogle Scholar
  18. IEEE Standard 828-1990, IEEE Standard for Software Configuration Management Plans can be found on http://ieeexplore.ieee.org/Xplore/Google ScholarGoogle Scholar
  19. IEEE (1987), IEEE1042-1987, Guide to Software Configuration Management, can be found in http://ieeexplore.ieee.org/Xplore/Google ScholarGoogle Scholar
  20. ISO standard 10007. 2003. Quality Management, Guidance for Configuration Management, can be found in http://www.iso.org/iso/Google ScholarGoogle Scholar
  21. ISO/IEC standard 12207.2008. Information technology -- Software life cycle processes" can be found in http://www.iso.org/iso/Google ScholarGoogle Scholar

Index Terms

  1. Non risk assessment information security assurance model

                        Recommendations

                        Comments

                        Login options

                        Check if you have access through your login credentials or your institution to get full access on this article.

                        Sign in
                        • Published in

                          cover image ACM Other conferences
                          InfoSecCD '09: 2009 Information Security Curriculum Development Conference
                          September 2009
                          144 pages
                          ISBN:9781605586618
                          DOI:10.1145/1940976

                          Copyright © 2009 ACM

                          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                          Publisher

                          Association for Computing Machinery

                          New York, NY, United States

                          Publication History

                          • Published: 25 September 2009

                          Permissions

                          Request permissions about this article.

                          Request Permissions

                          Check for updates

                          Qualifiers

                          • research-article

                          Acceptance Rates

                          Overall Acceptance Rate18of23submissions,78%

                        PDF Format

                        View or Download as a PDF file.

                        PDF

                        eReader

                        View online with eReader.

                        eReader