A E I

Transcription

A E I
ASSESSMENT OF ENTERPRISE INFORMATION SECURITY
HOW TO MAKE IT CREDIBLE AND EFFICIENT
Erik Johansson
October 2005
Submitted in partial fulfillment of the requirements for the
degree of Doctor of Philosophy
Industrial Information and Control Systems
KTH, Royal Institute of Technology
Stockholm, Sweden
Ex.R. 05-06
TRITA-ICS-0502
ISSN 1104-3504
ISRN KTH/ICS/R--05/02--SE
Cover illustration © 2005 Mathias Ekstedt and Erik Johansson
Stockholm 2005, Universitetsservice US AB
Abstract
Information is an important business asset in today’s enterprises. Hence enterprise information
security is an important system quality that must be carefully managed. Although enterprise
information security is acknowledged as one of the most central areas for enterprise IT
management, the topic still lacks adequate support for decision making on topmanagement level.
This composite thesis consists of four articles which presents the Enterprise Information
Security Assessment Method (EISAM), a comprehensive method for assessing the current state
of the enterprise information security. The method is useful in helping guide topmanagement’s decision-making because of the following reasons: 1) it is easy to
understand, 2) it is prescriptive, 3) it is credible, and 4) it is efficient.
The assessment result is easy to understand because it presents a quantitative estimate. The
result can be presented as an aggregated single value, abstracting the details of the
assessment. The result is easy to grasp and enables comparisons both within the
organization and in terms of industry in general.
The method is prescriptive since it delivers concrete and traceable measurements. This helps
guide top-level management in their decisions regarding enterprise-wide information
security by highlighting the areas where improvements efforts are essential.
It is credible for two reasons. Firstly, the method presents an explicit and transparent
definition of enterprise information security. Secondly, the method in itself includes an
indication of assessment uncertainty, expressed in terms of confidence levels.
The method is efficient because it focuses on important enterprise information security
aspects, and because it takes into account how difficult it is to find security related
evidence. Being resource sparse it enables assessments to take place regularly, which gives
valuable knowledge for long-term decision-making.
The usefulness of the presented method, along with its development, has been verified
through empirical studies at a leading electric power company in Europe and through
statistical surveys carried out among information security experts in Sweden.
The success from this research should encourage further researcher in using these analysis
techniques to guide decisions on other enterprise architecture attributes.
Key words: Enterprise Information Security, Enterprise Architecture, Security Assessment,
Information Technology Management, Architecture Theory Diagram, Electric Power Industry, Chief
Information Officer (CIO), Chief Information Security Officer (CISO).
I
ASSESSMENT OF ENTERPRISE INFORMATION SECURITY
Preface
The research and experiences reported herein spans a decade. It is the result of years of
research at the department of Industrial Information and Control Systems (ICS) at the Royal
Institute of Technology (KTH) in Stockholm, Sweden. For me personally, it all started off long
ago when I did research in the field of dependability assessments for safety-critical systems.
I noticed similar difficulties when assessing overall qualities in both safety and security
paradigms. During the years, following my Licentiate thesis, I continued to lecture at KTH,
and momentarily did some consultancies. I then observed an absence of methods for
quantitative assessments of enterprise-wide system qualities, and I was therefore enchanted
when an opportunity aroused to develop a quantitative assessment method for enterprise
information security, from the collaboration between ICS and Vattenfall AB.
Acknowledgements
First of all, I would like to express my sincere gratitude to Professor Torsten Cegrell, for
his encouragement, patience, and support during the overall course of my work. However,
without Dr. Pontus Johnson, the completion of this endeavor would not have been
possible. Pontus has provided me with invaluable support and fruitful collaboration. In
addition, I have greatly enjoyed the creative discussions and teamwork with Dr. Mathias
Ekstedt. I would also like to thank Dr. Johan Schubert for inspiring discussions during my
earlier years of research.
I am also indebted to all the people at the department for creating an atmosphere that has
made all these years both rewarding and fun. In particular, I would like to thank Judith
Westerlund, for always spreading a warm and happy atmosphere! Among the others at the
department I would particularly like to thank the members of the Enterprise Architecture
Research Programme (EARP) for excellent collaboration as well as for amusing and interesting
discussions.
My deep gratitude goes also to the sponsor of this research Vattenfall AB, particularly the
global CIO Group. I would especially like to mention Georg Karlén, without whom this
work would not have been feasible. Many thanks also to a number of individuals from the
Swedish power industry and from the Information Processing Society in Sweden, which
have contributed to results in the thesis by their cooperation and sharing of experience.
Finally, I would like to thank all my friends, my supporting parents, and my beloved wife
Carina and our lovely sons Jakob and Viktor, for their endless encouragement and support.
Stockholm, October 2005
Erik Johansson
III
Table of Contents
ABSTRACT ................................................................................................. I
PREFACE ................................................................................................. III
ACKNOWLEDGEMENTS .......................................................................... III
INTRODUCTION AND SUMMARY ................................................................7
BACKGROUND .............................................................................................................. 7
RESEARCH PURPOSE ..................................................................................................... 8
RELATED WORKS .......................................................................................................... 9
CONTRIBUTIONS ......................................................................................................... 13
RESEARCH DESIGN ...................................................................................................... 15
CONCLUSIONS ............................................................................................................ 18
REFERENCES ............................................................................................................... 21
PAPER A - AN ARCHITECTURE THEORY DIAGRAM DEFINITION ..........31
PAPER B - THE IMPORTANCE OF PRIORITIZATION ................................53
PAPER C - ESTIMATING THE CREDIBILITY OF THE RESULTS ................79
PAPER D - THE IMPORTANCE OF INFORMATION SEARCH COST .........101
V
ASSESSMENT OF ENTERPRISE INFORMATION SECURITY
VI
Introduction and Summary
INTRODUCTION AND SUMMARY
This introduction and summary starts with a description of the background for the work. It
continues with describing the rationale of this research and highlighting some related
works. Next follows a summary of the major contributions of the four included papers and
a section about the research design. Finally this introduction and summary closes with an
outline of the main conclusions of the present composite thesis.
BACKGROUND
This composite thesis presents results based upon a research project performed in
collaboration between the department of Industrial and Information Control Systems (ICS) at the
Royal Institute of Technology (KTH) and the company Vattenfall AB 1 . The research project has
focused on the development of a method for the assessment of Enterprise Information Security
(herein denoted as EIS). The project is part of ICS comprehensive research program, the
Enterprise Architecture Research Programme (EARP), that exploits the discipline of Enterprise
Architecture (EA) as an approach for managing the company’s total information system
portfolio. The primary stakeholder for the EA at a company is the persons who are
responsible for the management and evolution of the enterprise system - i.e. the overall
system of IT related entities. The overall goal of the EARP research program is to provide
top-level management with architecture-based tools and methods for planning and
decision-making of enterprise-wide information system, cf. (Johnson 2002).
In today’s large companies enterprise system is highly complex. Technically, large
enterprise possess several hundreds of extensively interconnected and heterogeneous IT
systems performing tasks that vary from Enterprise Resource Planning (ERP) to real-time
control and monitoring of the processes, such as Distributed Control System (DCS) and
Supervisory Control and Data Acquisition System (SCADA). Organizationally, the enterprise
system embraces business processes and business units using, as well as maintaining and
acquiring, the IT systems.
1
Vattenfall AB is one of today’s largest electric power companies operating in Europe (Vattenfall 2005).
7
ASSESSMENT OF ENTERPRISE INFORMATION SECURITY
Information and systems are to a large extent becoming integrated in industry operations.
Networking technologies offer tools for making communication and sharing of
information more efficient and faster than before. However, the networking and
interconnection of systems can significantly increase the enterprise exposure to information
security risks (Weiss 2001). In the operations of electric power industry a secure
communication of information is essential. A sufficient level of information security is a
necessary pre-requisite for the continuance and credibility of operations. The significance
of information security has been continuously increasing in the management of
organizations and in ensuring their operating ability as well as in maintaining disturbancefree and efficient operations. Thus, enterprise information security has become an increasingly
important system quality. Even though enterprise information security is one of the most
central areas for enterprise IT management, the area still lacks sufficient support for
decision-making on a top-management level.
The stakeholder amongst others for the present research is the CIO 2 (or the CISO 3 ) of
large enterprises whose needs drive and guide the assessment of enterprise information
security (Gottschalk et al. 2000, Kirkland 2002). The global CIO group at Vattenfall
recognized the need for an adequate method to estimate the level of information security
for the enterprise. Consequently this research project was initiated by Vattenfall. Hence
when it comes to the empirical context of this thesis, the forthcoming description is one
focused towards the requirements of the electric power industries. Furthermore it is within
this particular domain that the present research has been mainly empirically conducted.
However, it is the belief of the author that the need for, and requirements on, an adequate
assessment method regarding enterprise information security is similar in most industrial
domains.
RESEARCH PURPOSE
The purpose of this research project has been derived from Vattenfalls (along with other
large power and energy companies) need of an adequate method for the assessment of
enterprise information security.
Vattenfalls requirements of a good assessment method on enterprise information security
are stated to be; A) easy to understand, B) prescriptive, C) credible, and D) efficient. These
four aspects are further discussed below.
A) Results should be easy to understand. High-level assessment traditionally produces a
document reporting the potential findings. These types of results are difficult to
communicate in the organization and benchmarks of different units are
2
3
8
Chief Information Officer
Chief Information Security Officer
INTRODUCTION AND SUMMARY
impractical. The assessment method should rather present a numerical result.
Furthermore, the global CIO group at Vattenfall argue that the assessment result
would be easier to grasp (and thereby to communicate) if it is presented as a single
aggregated value, abstracting the assessment details. In addition, a numerical result
would be straightforward to use as a benchmark by enabling comparisons within
an organizational unit, between subsidiaries, and in terms of other power electric
companies, when directing new improvements.
B) Results should be prescriptive. In order to guide the top-level management in
decisions about improvement efforts on information security, the results from the
method should be concrete and traceable. The method should point out areas of
weaknesses and strengths thereby giving directions for improvements.
C) The assessment should be credible in two aspects. Firstly, the baseline for the
assessment has to be trustworthy, i.e. the theory has to be widely accepted.
Credible comparisons of organizational units can be established if the theory of
the assessment method is not biased towards any particular source. Secondly, this
type of assessment will always have less-than-perfect credibility; but it must be
clear to know how uncertain the result is.
D) It should be efficient. A detailed assessment of information security at the
enterprise top-level can become very expensive, due to the massive amount of
information and the resources needed to collect the appropriate evidences.
Usually, the resources available for the assessment are limited. The method has to
be efficient in terms of resource usage. An efficient assessment method is a prerequisite to enable frequent assessments to take place. Inexpensive assessment
(even though it may only be indicative) offers valuable knowledge when
performed regularly.
RELATED WORKS
This work has been inspired by, and is in many senses a continuation of, the previous
dissertations of Johnson (2002), and Ekstedt (2004). It spans a wide area of disciplines and
consequently this section will only present a brief review of related work. It begins by
describing the area of Enterprise Architecture (EA) and continues by highlighting the concept
of Information Security followed by a subsection on the notion Enterprise Information Security
(EIS). Lastly it relates to previous research on Decision-making and Assessment methods.
Enterprise Architecture. Managing a large company’s total information system portfolio
is difficult. Since large enterprises of today consist of hundreds of different systems which
are being integrated, there is an increasing need for abstracting these software-based
systems in order to grasp and manage their evolution. Already 1989, Mary Shaw stated that
9
ASSESSMENT OF ENTERPRISE INFORMATION SECURITY
“Larger Scale Systems Require Higher-Level Abstraction” (Shaw 1989). However, that was
a call for software architecture, and now it needs to be repeated for the enterprise level of
system architecture. The author agrees with Mathias Ekstedt who pointed out that the
Enterprise Architecture (EA) to a large extent has been deduced as a response to an ever
increasing need for abstracting software systems (Ekstedt 2004).
The area of EA has been widely described, discussed and defined in literature and on
websites (Zachman 1987, Spewak, Sowa and Zachman 1992, The Clinger-Cohen Act 1996,
Boar 1999, Armour et al. 1999a, Armour et al. 1999b, CIO Council 1999, Boster et al.
2000, Armour and Kaisler 2001, Armour et al. 2002, The Open Group 2003, DoDAF
2003, Jonkers et al. 2003, Perks et al. 2003, CIMOSA 2004, EAC 2004, FEAPMO 2004,
GEAO 2004, IFEAD 2004, Ronin 2004, ZIFA 2004).
Many authors have pointed out the close coupling between software architecture and
quality attributes (Boehm et al. 1978, Oskarsson 1982, Barbacci et al. 1995, Shaw et al.1996,
Allen 1997, Barbacci et al. 1997, Fenton and Pfleeger 1997, Bass et al. 1998, Kazman 1998,
Medvidovic 1999, Emmerich 2000, Garlan 2000, Kazman et al. 2001, Andersson 2002,
Johnson 2002, Clements et al. 2002, Ekstedt et al. 2004). Hence, the quality attribute of
information security is naturally a part of the EA discipline. This argument is also
strengthen by literature that state that the quality and appropriateness of a system cannot
be assessed only within the system itself, its overall context must also be taken into
consideration (Parnas 1972, Checkland 1981, Davies 1993, Brooks 1995, Kruchten 2000,
Linthicum 2000, Maier et al. 2000, Suh 2003 and Solms et al. 2004). In the case of the
continuously increasing number of integrated software systems inside companies, this
context is comprised of both the business organization and the IT departments (Stevens et
al. 1998, Johnson 2002, Ekstedt 2004, Stuart et al. 2004, Johnson and Ekstedt 2005).
Information Security. Information security is the protection of information and
information systems from unauthorized access, use, disclosure, disruption, modification, or
destruction in order to provide confidentiality, integrity, and availability of the information
processed in an organization (National Research Council 1991, Barbacci 1995, US
Government 2002). Information security as a concept is wide. Pragmatically, enterprise
information security is defined 4 by many different types of sources (OECD 1992 and 2002,
NIST 1995, Swanson et al. 1996, OMB 1996, Swanson 1998, Gollman 1999, ISO 2000, Liu
2001, Stoneburner 2001, Swanson 2001, Alberts et al. 2001a and 2003, Barman 2002,
Peltier 2002, Stoneburner 2002, SEI 2003, Gartner 2003, BSI 2003, EWICS 2003, FIPS
2003, ISF 2003, IT Governance Institute 2004, Caralli 2004, CEM 2004, Heiser 2004, PWC
2004, Ernst & Young 2005, and Ross et al. 2005).
Just as there is a problem with the consensus in the choice of word for the elaborated piece of reality, here
labelled the enterprise information security, likewise are there many words being used for it. Information Security
is most often used these days, but words such as Computer Security, Information Technology Security,
Information System Security, and even Cyber Security are also frequently encountered. However, in this thesis I
would like to emphasize that it concerns a high-level assessment by denoting the area Enterprise Information Security.
4
10
INTRODUCTION AND SUMMARY
Standards can provide an important component in the information security environment
but they should not be relied on blindly (Mercury 2003). In striving to define the area of
enterprise information security more than a few standards related to Information Security
have thus been analyzed. Several of the sources have different views. For instance some are
focus on security management (e.g. ISO 1997, ISO 2000, ISF 2003, and BSI 2003), some
on general security aspect for the processes (e.g. ITGI 2000 and 2004, and ITIL 2004), and
yet others on some specific security aspects (e.g. NIST 1995, ISO 1996, and SEI 2003).
Others are not applicable for this high-level assessment, because they focus on physical
security, and for specifying security requirements in IT products and systems (e.g. ISO
1998 and 2001, Wood 1990, ITSEC 1991 and CC 2004a-c, and Jones et al. 2005).
Enterprise Information Security. In this work four sources have been used as a base for
defining the area of enterprise information security, cf. (Johansson 2005a). The ISO/IEC
international standard 17799 Information Technology - Code of Practice for Information Security
Management (ISO 2000), National Institute of Standards and Technology (NIST) Special
Publication 800-26 Security Self-Assessment Guide for Information Technology Systems (Swanson
2001), The Standard of Good Practice for Information Security (SOGP), published by Information
Security Forum (ISF 2003), and the Operationally Critical Threat, Asset, and Vulnerability
EvaluationSM (OCTAVE®) approach released by CMU/SEI (Alberts et al. 2001b). In
October 2001 they released the OCTAVE Catalog of Practices that have been used in this
work (Alberts et al. 2001a).
NIST categorizes security technologies according to three primary purposes: support,
prevent, and recover (Swanson et al. 1996). Others (King et al. 2001; Bishop 2003) have
categorized security technologies slightly differently: prevent, detect, and recover. Others
comprise the environmental influence by pointing at the preventive and behavioral
attributes of security (Jonsson 1998). Regardless of which categorization is used, NIST
encourages security managers to use categories to help evaluate the benefit of a security
technology. Until now, security managers have little structured or quantitative guidance on
how to actually evaluate and compare technologies based on categories. The present work
contributes by providing a comprehensive categorization of the area based on syntactic and
semantic analysis (Johansson 2005a). However, finding an objective definition of the
discipline Enterprise Information Security (EIS) is not straight forward.
Based on the research performed by Johnson and Ekstedt, this work has used Architecture
Theory Diagram (ATD) as an approach for defining the area under examination (cf. Johnson
2002, Johnson et al. 2004, and Ekstedt 2004). In present research a new unambiguous and
transparent definition of enterprise information security has thus been created based on
four sources on the topic (Johansson 2005a). This transparent definition of the area
supports in the decision-making process for the CIO (Johnson et al. 2004).
Decision-making. Previous research on decision support in EA is sparse. Kazman, et al.
(Kazman et al. 2001) used multi-attribute analysis techniques to estimate the costs and
benefits of software architectural attributes, such as performance, security, and
11
ASSESSMENT OF ENTERPRISE INFORMATION SECURITY
modifiability, so that software engineers could make tradeoffs among information system
architectural design decisions. Other security decision-analysis models have been qualitative
in nature, such as the countermeasure matrix (Straub et al. 1998) which compares two security
risk-mitigation controls by highlighting their strengths and weaknesses relative to
deterrence, prevention, detection, and remedies.
Already 1996, Kontio (Kontio 1996) first proposed using a well-known decision analysis
technique called Analytic Hierarchy Process (Saaty 1990) to help software engineers make
systematic decisions when selecting commercial-off-the-shelf (COTS) products. The same
technique was used in the research performed by Karlsson, within the field of Requirement
Engineering for prioritizing requirements (Karlsson 1996 and 1998). In present research
this analysis technique has been successfully applied to help the organizations make
systematic prioritizations on the enterprise information security area (Johansson 2005b).
Moreover it has been used to perform two different surveys among security experts
(Johansson 2005b and 2005d). The tool FocalPoint used for these prioritizations is based
on the Analytic Hierarchy Process (FocalPoint 2005).
The use of statistical theory typically assumes that all observations are correct; statistical
theory cannot help us assess the credibility of individual observation, e.g. answers to
interview questions, for instance. For these purposes, this work use heuristics as employed
by historian researchers when evaluating the credibility of historical information, and as
employed by the judicial system when evaluating the credibility of witnesses and other
evidence in a court of law (Edvardsson 1998 and Pfleeger 2005). Based on the research of
Edvardsson, in the area of Critical Thinking, the present work has developed a heuristic
model to determine the credibility of individual observations (Johansson 2005c).
The work also relies on traditional statistical theory; a sample of observations may be
employed to estimate a value, e.g. the mean value, of a population. However, statistical
theory states that the fewer samples one uses and the more varied the used population is,
the lower the credibility of the estimation. Nevertheless it is possible to aggregate the
assessment answers into a single value with an estimated confidence level, cf. (Johansson
2005c) and (Blom 1984a and 1984b).
Assessment methods. To the author’s knowledge there is no single assessment method
available (besides the one proposed herein) that complies with all the high-level
requirements earlier stated by Vattenfall. The fact that assessing the qualities of information
security in the enterprise setting is both a technical and an organizational undertaking is
recognizes by most approaches today (e.g. Alberts et al. 2003, ISF 2003, SEI 2003, DFS
2004, and Veriscan 2005). In available assessment methods a lot of the focus relies on
identifying organizational assets that are important for the business by conducting
interviews with different stakeholders. But these methods do not attempt to estimate the
credibility of the measurement in the way the EISAM does (Johansson 2005c). Many
assessment methods use comprehensive checklists based on a standard, e.g. the ISO/IEC
17799 (ISO 2000). Others are mainly related to the security attribute in relation to the
12
INTRODUCTION AND SUMMARY
system design (Butler 2003). The checklist-based assessments inevitable give results that
depend on the skill of the team of respondents and the facilitator’s ability to prioritize the
areas that are most important for the enterprise under examination. Thus, existing metrics
in the field of information security, like (Swanson 2001, Swanson et al. 2003, SEI 2003, and
DFS 2004), does not easily get aggregated into a credible single value. In the method
proposed herein uncertainties of the observations are estimated and taken into account in
the result of the assessment (Johansson 2005c).
In addition, the objectiveness of the assessments is hard to judge since commercially
available methods lack transparency that enables researcher (or customers) to actually
review the baseline of their method. Besides, to the author’s knowledge there is no
available assessment method that neither takes into account for the limitations of the
available resources and optimizes the resources needed for the assessment nor estimates
the credibility of the assessment result, e.g. by examining the credibility of the respondents’
answers. Moreover, do they not assure that the most important areas are being assessed
neither do they estimate the cost of searching for the information needed.
In summary, none of today’s available assessment methods sufficiently satisfy the
requirements of Vattenfalls global CIO group, mentioned earlier in the section ”Research
Purpose.”
CONTRIBUTIONS
The section summarizes the contributions of the present work. Since this is a composite
thesis the details of the contributions are found in the four included papers, i.e. section A
to D (Johansson 2005a, Johansson 2005b, Johansson 2005c, and Johansson 2005d).
The major contribution of this thesis is a comprehensive method for assessing the current
state of enterprise information security. This method has been developed based on six
concepts: Database of Theory, Architecture Theory Diagram, Prioritization of Importance, Statistical
Credibility Analysis, Heuristic Credibility Assessment Model, and Information Search Cost Analysis.
The relation between the included papers describing these six concepts and the four major
characteristics of the presented method are presented in Table 1.
13
ASSESSMENT OF ENTERPRISE INFORMATION SECURITY
Table 1. The relation of central concepts to the characteristics of the method
Characteristic
Easy to
understand
Prescriptive
Credible
Database of Theory
X
X
X
Architecture
Theory Diagram
X
X
Concept
Efficient
A
A
Prioritization of
Importance
Statistical
Credibility Analysis
Heuristic
Credibility
Assessment Model
Information Search
Cost Analysis
Described
in paper:
X
B
X
C
X
C
X
D
In summary the presented method has the following characteristics:
-
it presents the final results as a single value that is easy to understand,
-
it indicates areas where improvement efforts are essential,
-
it offers a clear and transparent definition of enterprise information security,
-
it estimates the credibility to facilitate dependable results,
-
it enables prioritizations towards the most important areas for the enterprise,
-
it is resourceful by taking the cost of the information search into account.
The result is easy to understand because it presents a quantitative estimate that abstract the
details of the assessment. The result is easy to grasp and enables comparisons within the
organization and in terms of industry in general (Johansson 2005a and Johansson 2005c).
The method is prescriptive since it delivers concrete and traceable measurements. This helps
guide top-level management in their decisions regarding enterprise-wide information
security by highlighting the areas where there is lack of compliance and improvements
efforts are essential (Johansson 2005a, Johansson 2005b, Johansson 2005c, and Johansson
2005d).
The credibility of the method is established by the comprehensible and transparent definition
of enterprise information security. This has been established by using the concept
Architecture Theory Diagram (ATD) where several different well-known sources on the area of
enterprise information security have been consolidated (Johansson 2005a).
14
INTRODUCTION AND SUMMARY
The credibility of the results is established by indicating its uncertainty. The credibility is
expressed in terms of confidence levels, estimated by using two concepts Statistical
Credibility Analysis and Heuristic Credibility Analysis (Johansson 2005c).
The method is efficient since it focuses on important enterprise information security aspects
(Johansson 2005b). The efficiency is further optimized by taking into account how difficult it
is to find security related evidence (Johansson 2005d). This efficiency of the method
enables assessments to take place regularly, which offers valuable knowledge for long-term
decision-making.
Finally, the usefulness of the presented method, along with its development, has been
verified through empirical studies at a leading electric power company in Europe and
through statistical surveys carried out among information security experts in Sweden.
RESEARCH DESIGN
This section covers the methodological aspects that have guided the present work. It
covers the particularities of how the present work has been conducted, and the research
setting for the overall work is considered.
In table 2 different Research Strategies are listed (adapted from Yin 1994) and the strategies
used in this work are marked. As pointed out by Yin the choice of research strategy
depends mainly on the type of question and to what extent one has control over the event,
cf. Table 2 based on (Yin 1994).
Table 2. Research Strategies (Yin 1994)
Type of research
question
Control over
event
Contemporary
event
Used in
this thesis
How, why
Yes
Yes
No
Survey
Who, what, where,
how many/much
No
Yes
Yes
Archival
Who, what, where,
how many/much
No
Yes / No
Yes
History
How, why
No
No
No
Case Study
How, why
No
Yes
Yes
Experimental
This thesis mainly makes use of three research strategies. Archival Analysis has been used
15
ASSESSMENT OF ENTERPRISE INFORMATION SECURITY
when standards and documents have been used to define the area (Johansson 2005a).
Surveys have been used to prioritize the area, e.g. in (Johansson 2005b). Case Studies have
been used to estimate the credibility (Johansson 2005c) and to measure and estimate the
information search cost (Johansson 2005d).
Different types of Data Collection methods are listed in table 3 (Yin 1994). In this particular
work five of these six data collection methods have been used. Their use are described
briefly below.
Documentation has been used to establish the theory from selected standards, cf. (Johansson
2005a). Furthermore, the data collection by documentation has been of great importance in
when corroborating and augmenting evidence from other sources during the case studies,
cf. (Johansson 2005c and Johansson 2005d).
Interviews have been an important source in all the included papers (Johansson 2005a,
Johansson 2005b, Johansson 2005c, and Johansson 2005d). The assessments where made
by surveys based on focused interviews. In (Johansson 2005c) a large amount of the data
collected for estimating the credibility came from open-ended interviews. Finally, the
formal survey presented in (Johansson 2005d) was also based on interviews.
Direct observations have been a valuable source to verify data from interviews, e.g. verify if
fire extinguishers exist in the server room. However, participant observations have also been
used in a couple of occasions, e.g. testing the lengths of password etc, which could be used
to corroborate data from interviews (Johansson 2005c and Johansson 2005d).
16
INTRODUCTION AND SUMMARY
Table 3. Data Collection, strengths and weaknesses for different sources (Yin 1994)
Strengths
Documentation
Stable – can be reviewed
repeatedly
Unobtrusive – not created as
result of the study
Exact – contains exact names,
references, and details of an
event
Broad coverage – long span
of time, many events, and
many settings
Weaknesses
Retrievability – can be low
Used in
this
thesis
Yes
Biased selectively, if collection
is incomplete
Reporting bias – reflects
(unknown) bias of author
Access – may be deliberately
blocked
Archival
records
(same as above for documentation)
(same as above for documentation)
Precise and quantitative
Accessibility due to privacy
reasons
Interviews
Targeted – focused directly
on topic of study
Bias due to poorly constructed
questions
Insightful – provides
perceived causal inferences
Response bias
Yes
Yes
Inaccuracies due to poor recall
Reflexivity – interviewee gives
what interviewer wants to hear
Direct
Observations
Reality – covers event in real
time
Contextual – covers context
of event
Time-consuming
Yes
Selectively – unless broad
coverage
Reflexivity – event may
proceed differently because it is
being observed
Cost – hours needed by human
observers
Participant
Observation
(same as above for direct
observation)
Insightful into interpersonal
behavior and motives
Physical
Artifacts
Insightful into cultural
features
Insightful into technical
operations
(same as above for direct observation)
Yes
Bias due to investigator’s
manipulation of events
Selectivity
No
Availability
17
ASSESSMENT OF ENTERPRISE INFORMATION SECURITY
Regarding methods for Research Analysis, this work has mainly applied Statistical Analysis.
The statistical analyses have been used to evaluate the different surveys, to calculate the
confidence intervals, and to consolidate the theory, cf. (Johansson 2005a, Johansson 2005b,
Johansson 2005c, and Johansson 2005d). As a tool for manipulating the data, the software
Microsoft Excel has been used extensively.
In addition the presented assessment method includes other analysis method, for example
the Credibility Analysis and the Information Search Cost Analysis, but they are part of the result
of this thesis and thus are not presented as research analysis methods here. For more
information about these methods read the papers (Johansson 2005c and Johansson 2005d).
CONCLUSIONS
The conclusion of this thesis is that it is possible to develop an adequate method for the
assessment of enterprise information security.
The presented method is called the Enterprise Information Security Assessment Method (EISAM).
It is a comprehensive method for assessing the current state of the enterprise information
security. The EISAM has the following characteristics:
-
it presents the final results as a single value that is easy to understand,
-
it indicates areas where improvement efforts are essential,
-
it offers a clear and transparent definition of enterprise information security,
-
it estimates the credibility to facilitate dependable results,
-
it enables prioritizations towards the most important areas for the enterprise,
-
it is resourceful by taking the cost of the information search into account.
The result is easy to understand because it presents a quantitative estimate. The result is clear
and easy to understand since it can be presented as an aggregated single value, abstracting
the details of the assessment. The result is easy to grasp and enables comparisons within
the organization and in terms of industry in general.
The method is prescriptive since it delivers concrete and traceable measurements. This helps
guide top-level management in their decisions regarding enterprise-wide information
security by highlighting the areas where there is lack of compliance, and where
improvements efforts are essential (Johansson 2005a, Johansson 2005b, Johansson 2005c,
and Johansson 2005d).
18
INTRODUCTION AND SUMMARY
The understandability and the prescriptiveness has essentially been established by using a
Database of Theory and the concept of Architecture Theory Diagram together with Prioritization of
Importance further described in (Johansson 2005a and Johansson 2005b).
The credibility of the method is established by the comprehensible and transparent definition
of enterprise information security. This has been established by using the concept
Architecture Theory Diagram (ATD) where several different well-known sources on the area of
enterprise information security have been consolidated, further described in (Johansson
2005a).
The credibility of the results is established by indicating its uncertainty. The credibility is
expressed in terms of confidence levels, estimated by using the two concepts Statistical
Credibility Analysis and Heuristic Credibility Analysis further described in (Johansson 2005c).
The method is efficient since it focuses on important enterprise information security aspects
(Johansson 2005b). The efficiency is further optimized by taking into account how difficult it
is to find security related evidence. This prediction is based on the concept of Information
Search Cost further described in (Johansson 2005d). This efficiency of the method enables
assessments to take place regularly, which offers valuable knowledge for long-term
decision-making.
In this thesis the feasibility of using the EISAM in guiding enterprises in their information
security related decisions has been demonstrated. In addition, this thesis has provided a
preliminary evaluation of the usefulness of the ATD model on enterprise information
security. Real-world case studies have validated the feasibility of using the proposed
concepts. The usefulness of the proposed method, along with its development, has been
verified through empirical studies at a leading electric power company in Europe and
through statistical surveys carried out among information security experts in Sweden.
The success of this research should encourage further researchers in using these analysis
techniques to guide other enterprise architectural attribute decisions.
19
REFERENCES
Alberts, C., A. Dorofee, and J. Allen (2001a), OCTAVE Catalog of Practices, Version 2.0,
Technical Report CMU/SEI-2001-TR-020 Carnegie Mellon University Software
Engineering Institute, October 2001.
Alberts, C. and A. Dorofee (2001b), OCTAVE Criteria, Version 2.0, Technical Report
CMU/SEI-2001-TR-016, Carnegie Mellon University Software Engineering Institute,
December 2001.
Alberts, C. and A. Dorofee (2003) Managing Information Security Risks: The OCTAVE
Approach. New York: Addison-Wesley, 2003.
Allen, R. (1997), A Formal Approach to Software Architecture, Ph.D. Thesis, Carnegie Mellon
University, 1997.
Andersson, J. (2002), Enterprise Information Systems Management: An Engineering Perspective on the
Aspects of Time and Modifiability, Ph.D. Thesis, Royal Institute of Technology (KTH), 2002.
Armour, F. and S. Kaisler (2001), “Enterprise Architecture: Agile Transition and
Implementation,” IEEE IT Professional Vol. 3, No. 6, 2001.
Armour, F., S. Kaisler, and J. Getter (2002), “A UML-driven Enterprise Architecture Case
Study,” Proceedings of the 36th Hawaii International Conference on System Sciences, 2002.
Armour, F., S. Kaisler, and S. Liu (1999a), “A Big-Picture Look at Enterprise
Architecture”, IEEE IT Professional Vol. 1, No 1, 1999.
Armour, F., S. Kaisler, and S. Liu (1999b), “Building an Enterprise Architecture Step by
Step”, IEEE IT Professional Vol. 1, No 4, 1999.
Barbacci, M., M. Klein, and C. Weinstock (1997), Principles for Evaluating the Quality Attributes
of a Software Architecture, Technical Report CMU/SEI-96-TR-036, Carnegie Mellon
University Software Engineering Institute, 1997.
Barbacci, M., M. Klein, T. Longstaff, and C. Weinstock (1995), Quality Attributes, Technical
Report CMU/SEI-95-TR-021, Carnegie Mellon University Software Engineering Institute,
1995.
Barman S. (2002), Writing Information Security Policies, New Riders Publishing, 2002.
Bass, L., P. Clements, and R. Kazman (1998), Software Architecture in Practice, AddisonWesley, 1998.
Bishop, M. (2003), Computer Security: Art and Science, Addison Wesley, 2003.
Blom, Gunnar (1984a), Sannolikhetsteori med tillämpningar (A), Studentlitteratur, 1984.
Blom, Gunnar (1984b), Statistikteori med tillämpningar (B), Studentlitteratur, 1984.
Boar, B. (1999), Constructing Blueprints for Enterprise IT Architectures, John Wiley & Sons, 1999.
Boehm, B.W., et al. (1978), Characteristics of software quality, North Holland, 1978.
Boster, M., S. Liu, and R. Thomas (2000), “Getting the Most from Your Enterprise
Architecture,” IEEE IT Professional Vol. 2, No. 4, 2000.
21
ASSESSMENT OF ENTERPRISE INFORMATION SECURITY
Brooks, F. (1975), The Mythical Man-Month, Anniversary Edition: Essays on Software Engineering,
Addison-Wesley, 1st ed. 1975, 1995.
BSI (2003) - Bundesamt für Sicherheit in der Informationstechnik (Federal Office for
Information Security), IT Baseline Protection Manual, 2003, website http://www.bsi.bund.de/
accessed April 10, 2004.
Butler S.A. (2003), Security Attribute Evaluation Method, Ph.D Thesis, Carnegie Mellon
University, Pittsburgh, USA, May 2003.
Caralli R.A. (2004), The Critical Success Factor Method: Establishing a Foundation for Enterprise
Security Management, Technical Report CMU/SEI-2004-TR-010, Carnegie Mellon University
Software Engineering Institute, 2004
CC (2004a), Common Criteria for Information Technology Security Evaluation, “Part 1:
Introduction and general model,” Version 2.2, CCIMB-2004-01-001, January 2004, available at
http://niap.nist.gov/cc-scheme/cc_docs/cc_v22_part1.pdf last accessed 4 September
2005.
CC (2004b), Common Criteria for Information Technology Security Evaluation, “Part 2:
Security functional requirements,” Version 2.2, CCIMB-2004-01-002, January 2004, available at
http://niap.nist.gov/cc-scheme/cc_docs/cc_v22_part2.pdf last accessed 4 September
2005.
CC (2004c), Common Criteria for Information Technology Security Evaluation, “Part 3:
Security assurance requirements,” Version 2.2, CCIMB-2004-01-003, January 2004, available at
http://niap.nist.gov/cc-scheme/cc_docs/cc_v22_part3.pdf last accessed 4 September
2005.
CEM (2004), Common Methodology for Information Technology Security Evaluation,
“Evaluation Methodology” Version 2.2, CCIMB-2004-01-004, January 2004, available at
http://niap.nist.gov/cc-scheme/cc_docs/cem_v12.pdf last accessed 4 September 2005.
Checkland, P. (1981), Systems Thinking, Systems Practice, John Wiley & Sons, 1981.
CIMOSA, The CIMOSA Association (2004), http://www.cimosa.de , accessed September 7,
2004.
CIO Council (1999), The Federal Enterprise Architecture Framework, Version 1.1, The Chief
Information Officer Council, 1999, available at http://www.cio.gov/archive/fedarch1.pdf
last accessed September 4 2005.
Clinger-Cohen Act (1996), National Defense Authorization Act for Fiscal Year 1996, Division E,
Public Law 104–106, February 10, 1996, http://www.osec.doc.gov/cio/oipr/itmra.pdf
last accessed September 4, 2005.
Davies, A. (1993), Software Requirements: Objects, Functions, and States, Prentice Hall, 1993.
DFS (2004), Swedish Information Processing Society (Dataföreningen i Sverige, DFS),
SBA Check, http://www.dfs.se/products/sbaeng/check last accessed May 2004.
DoDAF (2003), DoD Architecture Framework Version 1.0, DoD Architecture Framework
Working Group, US Department of Defense, 2003.
EAC (2004), Enterprise Architecture Community, http://www.eacommunity.com , last
accessed April 10 2004.
22
REFERENCES
Edvardsson B. (1998), “The Need for Critical Thinking in Evaluation of Information”,
Proceedings of the 18th International Conference on Critical Thinking, Rohnert Park, USA, August 14, 1998.
Ekstedt M. (2004), Enterprise Architecture for IT Management - A CIO Decision Making Perspective
On Electric Power Industry, Ph.D. Thesis, Royal Institute of Technology (KTH), Stockholm,
2004.
Ekstedt M., P. Johnson, Å. Lindström, M. Gammelgård, E. Johansson, L. Plazaola, and E.
Silva (2004), “Consistent Enterprise Software System Architecture for the CIO – A utilityCost Approach”, Proceedings of the 37th annual Hawaii International Conference on System Sciences
(HICSS), Big Island, Hawaii, USA, 2004.
Emmerich W. (2000), “Software engineering for middleware: a roadmap”, International
Conference on Software Engineering, Proceedings of the Conference on The Future of Software Engineering,
Limerick, Ireland, June 04-11, 2000.
Ernst & Young (2004), Global Information Security Survey 2004, at http://www.ey.com,
accessed September 2005.
EWICS (2003), Information Operations – Target, Means and Weapon, Version 1.0, European
Workshop on Industrial Computer Systems TC7 Security subgroup, 2003, available at
http://www.ewics.org, last accessed 2005.
FEAPMO (2004), Federal Enterprise Architecture Program Management Office website,
http://www.feapmo.gov, accessed April 1, 2004.
FIPS (2003), Federal Information Processing Standards Publications, Standards for Security
Categorization of Federal Information and Information Systems, FIPS PUB 199, December 2003.
Fenton, N. and S. Pfleeger (1997), Software Metrics: A Rigorous and Practical Approach, 2nd ed.,
PWS Publishing, 1997.
FocalPoint (2005), Linköping, Sweden, website http://www.focalpoint.se, last accessed 10
February 2005.
Garlan D. (2000), “Software Architecture: a Roadmap,” In A. Finkelstein (ed.), The Future of
Software Engineering: 22nd International Conference on Software Engineering, 2000.
Gartner (2003), Information Security – Establishing a Strong Defense in Cyberspace, Gartner Inc.,
2003, available at http://www.gartner.com/5_about/news/sec_sample.pdf, accessed aug
2005.
GEAO (2004), Global Enterprise Architecture Organization web site, http://www.geao.org,
accessed April 1, 2004
Gollman, D. (1999), Computer Security, Wiley, 1999.
Gottschalk, P., and N. Taylor (2000), “Strategic Management of IS/IT Functions: The Role
of the CIO,” Proceedings of the 33rd Hawaii International Conference on System Sciences, 2000.
Heiser et al. (2004), Enterprise Security Architecture Using IBM Tivoli Security Solutions, website
http://www.redbooks.ibm.com/redbooks.nsf/redbooks ; last accessed October 2004.
IFEAD (2004), Institute for Enterprise Architecture Developments, website,
http://www.enterprise-architecture.info, accessed April 10, 2004.
23
ASSESSMENT OF ENTERPRISE INFORMATION SECURITY
ISF (2003) Information Security Forum, The Standard of Good Practice for Information Security,
2003, available at http://www.isfsecuritystandard.com, last accessed 16 May 2004.
ISO (1996), ISO/IEC TR 13335-1:1996 Information technology. Guidelines for the management of
IT security. Concepts and models for IT Security, 1996.
ISO (1997), ISO/IEC TR 13335-2:1997 Information technology. Guidelines for the management of
IT security. Managing and planning IT Security, 1997
ISO (1998), ISO/IEC TR 13335-3:1998 Information technology. Guidelines for the management of
IT security. Techniques for the management of IT security, 1998.
ISO (2000), ISO/IEC International Standard 17799:2000 Information Technology - Security
techniques - Code of Practice for Information Security Management, 2000.
ISO (2001), ISO/IEC TR 13335-5:2001Information technology. Guidelines for the management of
IT security. Management guidance of network security, 2001
ISO (2004), ISO/IEC International Standard 21827 Systems Security Engineering Capability
Maturity Model, at http://www.sse-cmm.org accessed 2004.
ITGI (2000), IT Governance Institute, Control Objectives for Information and related Technology
(COBIT), 3rd. Edition, 2000.
ITGI (2004), IT Governance Institute, COBIT Security Baseline - An Information Security
Survival Kit, 2004.
ITIL (2004), The IT Infrastructure Library (ITIL), at http://www.itil-itsm-world.com/ last
accessed 2004.
ITSEC (1991) Information Technology Security Evaluation Criteria (ITSEC), Provisional
Harmonised Criteria, Office for Official Publications of the European Communities,
Luxembourg, 1991.
Johansson E. and P. Johnson (2005a), “Assessment of EIS - An ATD Definition”,
Proceedings of the 3rd Annual Conference on Systems Engineering Research (CSER), New York,
March 23-25, 2005.
Johansson E. and P. Johnson (2005b), “Assessment of Enterprise Information Security –
The Importance of Prioritization”, Proceedings of the 9th IEEE International Annual Enterprise
Distributed Object Computing Conference (EDOC), Enschede, The Netherlands, September 1923, 2005.
Johansson E. and P. Johnson (2005c), “Assessment of Enterprise Information Security –
Estimating the Credibility of the Results”, Proceeding of the Symposium on Requirements
Engineering for Information Security (SREIS) in the 13th International IEEE Requirements Engineering
Conference, Paris, France, August 29th to September 2nd, 2005.
Johansson E., M. Ekstedt, and P. Johnson (2005d), “Assessment of Enterprise Information
Security – The Importance of Information Search Cost”, to appear in the proceedings of 39th
Hawaii International Conference on System Sciences (HICSS), Kauai, Hawaii, January 4-7, 2006.
Johansson E., P. Sandberg, and L. Pettersson (2005e), “The Enterprise Information
Security Assessment Method - an approach for credible and efficient assessments applied
in an European Energy Company”, to appear in the proceedings of 29th European Safety, Reliability
& Data Association (ESReDA) Seminar on Systems Analysis for a More Secure World, European
Commission Joint Research Centre (JRC), IPSC, Ispra, Italy, October 25-26, 2005.
24
REFERENCES
Johnson, P. (2002), Enterprise Software System Integration – An Architectural Perspective, Ph.D.
Thesis, Royal Institute of Technology (KTH), Stockholm, 2002.
Johnson, P. and M. Ekstedt (2005), The Grand Unified Theory of Software Engineering, Preprint,
ISBN 91-974620-1-2, KTH – Royal Institute of Technology, Stockholm, 2005.
Johnson, P., M. Ekstedt, E. Silva, and L. Plazaola (2004), “Using Enterprise Architecture
for CIO Decision-Making: On the importance of theory”, Proceedings of the 2nd Annual
Conference on Systems Engineering Research (CSER), April 15-16, 2004.
Jones A. and D. Ashenden (2005), Risk management for computer security: protecting your network
and information assets, Elsevier Butterworth-Heinemann, 2005.
Jonkers, H. et al. (2003), “Towards a Language for Coherent Enterprise Architecture
Descriptions,” Proceedings of the 7th IEEE International Enterprise Distributed Object Computing
Conference (EDOC’03), 2003.
Jonsson E. (1998), “An Integrated Framework for Security and Dependability”, Proceedings
of the 1998 workshop on New security paradigms, Virginia, United States, pp. 22-29, 1998.
Karlsson J. (1996), “Software Requirements Prioritizing”, Proceedings of the 2nd IEEE
International Conference on Requirements Engineering, pp. 110–116, 1996.
Karlsson J., et al. (1998), “An evaluation of methods for prioritizing software
requirements”, Information and Software Technology 39, pp. 939–947, 1998.
Kazman R., G. Abowd, L. Bass, P. Clements (1996), "Scenario-Based Analysis of Software
Architecture", IEEE Software November 1996.
Kazman R., M. Klein, M. Barbacci, T. Longstaff, H. Lipson, and J. Carriere (1998), “The
Architecture Tradeoff Analysis Method”, Proceedings of 4th IEEE International Conference on
Engineering Complex Computer Systems (ICECCS '98), Monterey, USA, 1998.
Kazman R., J. Asundi, and M. Klein (2001), “Quantifying the Costs and Benefits of
Architectural Decisions”, Proceedings of the 23rd International Conference on Software Engineering
(ICSE 23), Toronto, Canada, 2001.
Kazman R., M. Klein and P. Clements (2000), ATAM: Method for Architecture Evaluation,
Technical Report CMU/SEI-2000-TR-004 Carnegie Mellon University Software
Engineering Institute, 2000.
King, C., C. Dalton, and E. Osmanoglu (2001), Security Architecture: Design, Deployment &
Operations, McGraw-Hill RSA Press, 2001.
King, G., R. Keohane, and S. Verba (1994), Designing Social Inquiry: Scientific Inference in
Qualitative Research, Princeton University Press, 1994.
Kirkland, N. (2002), “CIO Agenda for Productivity and Growth”, Gartner Symposium ITxpo,
Cannes, France, 4-7 November, 2002.
Kontio, J. (1996), “A Case Study in Applying a Systematic Method for COTS Selection”,
Proceedings of 18th International Conference on Software Engineering, IEEE Computer Society Press,
1996.
Kruchten, P. (2000), The Rational Unified Process: An Introduction, 2nd ed. Addison-Wesley,
2000.
Linthicum, D. (2000), Enterprise Application Integration, Addison Wesley, 2000.
25
ASSESSMENT OF ENTERPRISE INFORMATION SECURITY
Liu S. (2001), “A Practical Approach to Enterprise IT Security”, IT Pro September-October,
pp 35-42, 2001.
Maier, M. and E. Rechtin (2000), The Art of Systems Architecting, 2nd ed., CRC Press, 2000.
Medvidovic, N. David S. Rosenblum, and Richard N. Taylor (1999), “A Language and
Environment for Architecture-Based Software Development and Evolution”, Proceedings of
the 21th International Conference on Software Engineering (ICSE), Los Angeles, USA, 1999.
Mercuri, R. (2003), “Standards Insecurity”, Communications of the ACM, Vol. 46, No 12,
2003.
National Research Council (1991), Computers at Risk: Safe Computing in the Information Age,
System Security Study Committee, Commission on Physical Sciences, Mathematics, and
Applications, National Research Council, Washington DC, National Academy Press, 1991,
also available at http://www.nap.edu/catalog/1581.html .
NIST (1995), National Institute of Standards and Technology (NIST) Special Publication
(SP) 800-12, An Introduction to Computer Security: The NIST Handbook, October 1995.
OECD (1992), Organization for Economic Co-operation and Development, Guidelines for
the Security of Information Systems, OECD Recommendation, Paris, 1992.
OECD (2002), Organization for Economic Co-operation and Development, Guidelines for
the Security of Information Systems and Networks: Towards a culture of security, OECD
Recommendation, Paris, 2002.
OMB Circular No. A-130 (1996), “Management of Federal Information Resources”, 1996.
Oskarsson, Ö. (1982), Mechanisms of Modifiability in Large Software Systems, Ph. D. Thesis,
Linköping University, Sweden, 1982.
Parnas, D. (1972), “On the Criteria To Be Used in Decomposing Systems into Modules,”
Communications of the ACM, Vol. 15, No. 12, 1972.
Peltier T. (2002), Information Security, Policies, Procedures, and Standards, Auerbach Publications,
2002.
Perks C. and T. Beveridge (2003), Guide to Enterprise IT Architecture, Springer Verlag, 2003
Pfleeger S.L. (2005), “Soup or Art? The Role of Evidential Force in Empirical Software
Engineering”, IEEE Software Volume 22, Issue 1, p 66 – 73, Jan-Feb 2005.
PWC (2004), PriceWaterhouseCoopers “The State of Information Security, 2003“
http://www.pwc.com, accessed 2004.
Ronin (2004), Ronin International Inc. Enterprise Unified Process website,
http://www.enterpriseunifiedprocess.info, accessed April 1, 2004.
Ross R. et al. (2005), Information Security, National Institute of Standards and Technology
Special Publication 800-53, US Government printing office, Washington D.C., February
2005.
Saaty T.L. (1980), The Analytic Hierarchy Process, McGraw-Hill, New York, USA, 1980.
SEI (2003), Software Engineering Institute, Systems Security Engineering Capability Maturity
Model® SSE-CMM Model Description Document, Version 3.0. June 15, 2003.
26
REFERENCES
Shaw, M. (1989), “Larger Scale Systems Require Higher-Level Abstractions,” Proceedings of
the 5th international workshop on Software specification and design, 1989.
Shaw, M. and D. Garlan (1996), Software Architecture: Perspectives on an Emerging Discipline,
Prentice Hall, 1996.
Solms B., et al. (2004), “The 10 deadly sins of information security management”, Computers
& Security, 23:371–376, 2004.
Sowa, J. and J Zachman (1992), “Extending and Formalizing the Framework for
Information Systems Architecture,” IBM Systems Journal, Vol. 31, No 3, 1992.
Spewak, S. (1992), Enterprise Architecture Planning: Developing a Blueprint for Data, Applications
and Technology, John Wiley & Sons, 1992.
Stevens, R., P. Brook, K. Jackson, and S. Arnold (1998), Systems Engineering: Cooping with
Complexity, Prentice Hall, 1998.
Stoneburner, G. (2001), Underlying Technical Models for Information Technology Security, National
Institute of Standards and Technology Special Publication 800-33, US Government
printing office, Washington D.C., USA, 2001
Stoneburner, G., et al. (2002), Risk Management Guide for Information Technology Systems,
National Institute of Standards and Technology Special Publication 800-30, US
Government printing office, Washington D.C., 2002.
Straub, D.W., and R.J. Welke (1998), “Coping with Systems Risk: Security Planning Models
for Management Decision Making,” Management Information System Quarterly (MISQ) Volume
22, Number 4, 1998.
Stuart A. and H.W. Lawson (2004), “Viewing systems from a business management
perspective: The ISO/IEC 15288 standard”, The Journal Systems Engineering , Volume 7,
Issue 3, pp 229-242, 2004.
Suh B., and Ingoo Han (2003), “The IS risk analysis based on a business model”, Information
& Management, 41(2):149–158, Elsevier Science Publishers, Amsterdam, The Netherlands, 2003.
Swanson M. and Barbara Guttman (1996), Generally Accepted Principles and Practices for Securing
Information Technology Systems, National Institute of Standards and Technology Special
Publication 800-14, US Government printing office, Washington D.C., September 1996.
Swanson M. (1998), Guide for Developing Security Plans for Information Technology Systems,
National Institute of Standards and Technology Special Publication 800-18, US
Government printing office, Washington D.C., December 1998.
Swanson M. (2001), Security Self-Assessment Guide for Information Technology systems, National
Institute of Standards and Technology Special Publication 800-26, US Government
printing office, Washington D.C., November 2001.
Swanson M. et al. (2003), Security Metrics for Information Technology Systems, National Institute
of Standards and Technology Special Publication 800-55, US Government printing office,
Washington D.C., July 2003.
TOG (2003), The Open Group, The Open Group Architectural Framework (TOGAF) Version
8.1, published in December 2003, http://www.opengroup.org/architecture/togaf8/index8.htm
; accessed 2004.
27
ASSESSMENT OF ENTERPRISE INFORMATION SECURITY
US Government (2002), Federal Information Security Management Act of 2002 (Title III of E-Gov),
H.R. 2458-48, SEC. 301, Information Security, http://csrc.nist.gov/policies/FISMAfinal.pdf .
Vattenfall AB (2005), website: http://www.vattenfall.com, accessed August 1, 2005
Veriscan (2005), Veriscan Rating®, http://www.veriscan.se, accessed June 16, 2005.
Weiss, J. (2001), “Electronic security technology roadmap [for electric utilities]”, Power
Engineering Society Winter Meeting, 2001, IEEE Volume 1, 2001.
Wood J. (1990), “European Harmonised IT Security Evaluation Criteria”, Proceedings of the
6th International Conference on the Application of Standards for Open Systems, USA, 1990.
Yin, R.K. (1996), Case Study Research: Design and Methods, 2nd ed., Sage Publications, 1996.
Zachman, J. (1987), “A Framework for Information Systems Architecture,” IBM Systems
Journal, Vol. 26, No 3, 1987.
ZIFA (2004), The Zachman Institute for Framework Advancement website, website:
http://www.zifa.com, accessed April 1, 2004.
28