A Systematic Approach to the Management of System Security Reengineering Process

A Master of Science thesis in ESM (Engineering Systems Management) Submitted to the School of Engineering by Ghanem Ibrahim El - Shahry, "A Systematic Approach to the Management of System Security Reengineering Process," May 2005. Thesis Advisor Dr. Kassem Saleh. Available are Both Soft an...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: El-Shahry, Ghanem Ibrahim (author)
التنسيق: doctoralThesis
منشور في: 2005
الموضوعات:
الوصول للمادة أونلاين:http://hdl.handle.net/11073/102
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513432972165120
author El-Shahry, Ghanem Ibrahim
author_facet El-Shahry, Ghanem Ibrahim
author_role author
dc.contributor.none.fl_str_mv Saleh, Kassem
dc.creator.none.fl_str_mv El-Shahry, Ghanem Ibrahim
dc.date.none.fl_str_mv 2005-05
2011-03-10T12:43:55Z
2011-03-10T12:43:55Z
dc.format.none.fl_str_mv application/pdf
dc.identifier.none.fl_str_mv 35.232-2005.03
http://hdl.handle.net/11073/102
dc.language.none.fl_str_mv en_US
dc.subject.none.fl_str_mv Engineering
Management
Computer security
Engineering systems
dc.title.none.fl_str_mv A Systematic Approach to the Management of System Security Reengineering Process
dc.type.none.fl_str_mv info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/doctoralThesis
description A Master of Science thesis in ESM (Engineering Systems Management) Submitted to the School of Engineering by Ghanem Ibrahim El - Shahry, "A Systematic Approach to the Management of System Security Reengineering Process," May 2005. Thesis Advisor Dr. Kassem Saleh. Available are Both Soft and Hard Copies of the Thesis.
format doctoralThesis
id aus_2df04befba50dd239b328dc8f122e581
identifier_str_mv 35.232-2005.03
language_invalid_str_mv en_US
network_acronym_str aus
network_name_str aus
oai_identifier_str oai:repository.aus.edu:11073/102
publishDate 2005
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
spelling A Systematic Approach to the Management of System Security Reengineering ProcessEl-Shahry, Ghanem IbrahimEngineeringManagementComputer securityEngineering systemsA Master of Science thesis in ESM (Engineering Systems Management) Submitted to the School of Engineering by Ghanem Ibrahim El - Shahry, "A Systematic Approach to the Management of System Security Reengineering Process," May 2005. Thesis Advisor Dr. Kassem Saleh. Available are Both Soft and Hard Copies of the Thesis.With the increasing dependency on the electronic world for doing business using computers, palms, wireless devices, and the Internet, there is a need for revising the security measures and controls built into existing communication and computer systems. Several computer-based systems were originally built without considering the security in the system development phase. Consequently, a systematic approach to the management of the reengineering of system's security is recommended. The goal is to ensure that all critical services are well protected and less vulnerable to security threats. Ultimately, the system will be secured according to the organization's business security needs and business continuity plan. The proposed approach uses formal and standard specification techniques for describing security requirements and developing security acceptance test cases. A security gap analysis is first performed, and the system is reengineered starting from the requirements analysis ending with the user acceptance testing. The benefits of the approach are twofold. First, security requirements, as expected by the system stakeholders, will be satisfied by the current implementation, hence enhancing the system security and improving the trust in it. Second, any additional and future security requirements or modifications to existing requirements will be dealt with in a formal way and not as security patches or fixes to the implementation. The current security standards have been examined. International Organization for Standardization 17799:2000, security standard was chosen since it addresses all current types of security requirements, and for its international visibility. An overview of all known security requirements related to the four security goals, namely confidentiality, integrity, availability and accountability, were discussed. A comprehensive listing and mapping of all known types of security requirements are linked to the Secure Unified Modeling Language security stereotypes. As a result of this mapping, the author has extended the language stereotypes to address additional availability, accountability and immunity security requirements. Finally, security requirements are mapped to the security mechanism using corresponding serotypes. This approach is a product-independent and mechanism-independent system security reengineering process to cope with the rapid changes in evolving technologies and the dynamic nature of the technology world.College of EngineeringDepartment of Industrial EngineeringMaster of Science in Engineering Systems Management (MSESM)Saleh, Kassem2011-03-10T12:43:55Z2011-03-10T12:43:55Z2005-05info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/doctoralThesisapplication/pdf35.232-2005.03http://hdl.handle.net/11073/102en_USoai:repository.aus.edu:11073/1022025-11-11T07:05:35Z
spellingShingle A Systematic Approach to the Management of System Security Reengineering Process
El-Shahry, Ghanem Ibrahim
Engineering
Management
Computer security
Engineering systems
status_str publishedVersion
title A Systematic Approach to the Management of System Security Reengineering Process
title_full A Systematic Approach to the Management of System Security Reengineering Process
title_fullStr A Systematic Approach to the Management of System Security Reengineering Process
title_full_unstemmed A Systematic Approach to the Management of System Security Reengineering Process
title_short A Systematic Approach to the Management of System Security Reengineering Process
title_sort A Systematic Approach to the Management of System Security Reengineering Process
topic Engineering
Management
Computer security
Engineering systems
url http://hdl.handle.net/11073/102