Department of Defense (DoD) information assurance (IA) certification and accreditation relies on a multi-tier risk framework where security assessment aligns with NIST information assurance control set. The human analyst faces multiple burdens, including resolving dependencies among IA controls, understanding how security requirements apply to a specific context, and integrating expertise from multiple technical areas. In this research, we will investigate new ways to leverage component-based architecture in reducing security threats. These new techniques integrate human security expert judgements with notions of composable security to identify interactions among security requirements that affect overall system assurance levels. The researc...
In today’s business environment, almost all information is captured and stored in electronic form. T...
Understanding and managing information infrastructure (II) security risks is a priority to most orga...
With the increase in the number and diversity of attacks, a main concern for organizations is to kee...
Like any organization, the DoD still relies on security analysts who can ensure that security requir...
The U.S. DoD transition to a multi-tier, risk management framework aims to streamline information as...
The U.S. DoD transition to a multi-tier, risk management framework aims to streamline information as...
In the information security business, 30 years of practical and theoretical research has resulted in...
In the information security business, 30 years of practical and theoretical research has resulted in...
In the information security business, 30 years of practical and theoretical research has resulted in...
Providing secure solutions for information systems relies on decisions made by expert security profe...
With the digitalisation of information, the security aspect of it has become more important than eve...
University of Minnesota Ph.D. dissertation. December 2009. Major: Computer Science. Advisor: David L...
Information assurance and cybersecurity has become a critical element in the daily lives of almost e...
Traditional risk management methods developed and practiced by the Information Assurance (IA) commun...
The Department of Defense (DoD) Risk Management Framework (RMF) for IT systems is aligned with the N...
In today’s business environment, almost all information is captured and stored in electronic form. T...
Understanding and managing information infrastructure (II) security risks is a priority to most orga...
With the increase in the number and diversity of attacks, a main concern for organizations is to kee...
Like any organization, the DoD still relies on security analysts who can ensure that security requir...
The U.S. DoD transition to a multi-tier, risk management framework aims to streamline information as...
The U.S. DoD transition to a multi-tier, risk management framework aims to streamline information as...
In the information security business, 30 years of practical and theoretical research has resulted in...
In the information security business, 30 years of practical and theoretical research has resulted in...
In the information security business, 30 years of practical and theoretical research has resulted in...
Providing secure solutions for information systems relies on decisions made by expert security profe...
With the digitalisation of information, the security aspect of it has become more important than eve...
University of Minnesota Ph.D. dissertation. December 2009. Major: Computer Science. Advisor: David L...
Information assurance and cybersecurity has become a critical element in the daily lives of almost e...
Traditional risk management methods developed and practiced by the Information Assurance (IA) commun...
The Department of Defense (DoD) Risk Management Framework (RMF) for IT systems is aligned with the N...
In today’s business environment, almost all information is captured and stored in electronic form. T...
Understanding and managing information infrastructure (II) security risks is a priority to most orga...
With the increase in the number and diversity of attacks, a main concern for organizations is to kee...