The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Using the Techniques of a Security Assessment to Guide Technology Development in Education

Download

Download PDF Document
PDF

Author

Stephanie Miller

Tech report number

CERIAS TR 1999-12

Entry type

mastersthesis

Abstract

The goal of this thesis is to structure and present the complete process involved in implementing a security assessment. Our objective is to capture the essence of a successful security assessment. We will not only document best practices, but will outline such an assessment for a project underway in the School of Education and funded by the State of Indiana. That project promotes improved evaluation of special needs students. The result of this work has been a concrete example of a security assessment methodology as well as a documented process that can be utilized as a template in future assessments.the assessment techniques we recommend in this thesis include project examination, threat analysis, modeling of data flows, and development of a security architecture. Other topics we will address throughout the document include fundamental security precautions, such as ensuring confidentiality, integrity, and availability. We will offer insight on dissemination of results to project sponsors and users to encourage the effectiveness of the deliverales produced during a security assessment.

Download

PDF

Date

1999

Institution

CERIAS, Department of Computer Sciences, Purdue University

Key alpha

miller

School

Purdue University

Publication Date

1900-01-01

Contents

1. Introduction 2. Setting the Stage: Introducing IASEP 3. Fundamentals of Computer Security 4. The Assessment Details 5. The Assessment Methodology Abstracted 6. Conclusions and Lessons Learned

Language

English

Location

A hard-copy of this is in the CERIAS Library

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.