System Security Assurance: A Systematic Literature Review

10/05/2021
by   Ankur Shukla, et al.
0

Security assurance provides the confidence that security features, practices, procedures, and architecture of software systems mediateand enforce the security policy and are resilient against security failure and attacks. Alongside the significant benefits of securityassurance, the evolution of new information and communication technology (ICT) introduces new challenges regarding informationprotection. Security assurance methods based on the traditional tools, techniques, and procedures may fail to account new challengesdue to poor requirement specifications, static nature, and poor development processes. The common criteria (CC) commonly used forsecurity evaluation and certification process also comes with many limitations and challenges. In this paper, extensive efforts havebeen made to study the state-of-the-art, limitations and future research directions for security assurance of the ICT and cyber-physicalsystems (CPS) in a wide range of domains. We systematically review the requirements, processes, and activities involved in systemsecurity assurance including security requirements, security metrics, system and environments and assurance methods. We shed lighton the challenges and gaps that have been identified by the existing literature related to system security assurance and correspondingsolutions. Finally, we discussed the limitations of the present methods and future research directions.

READ FULL TEXT
research
12/01/2020

Software Security Patch Management – A Systematic Literature Review of Challenges, Approaches, Tools and Practices

Context: Software security patch management purports to support the proc...
research
04/24/2020

Cyber Security Behaviour In Organisations

This review explores the academic and policy literature in the context o...
research
12/17/2022

A Survey on Password Guessing

Text password has served as the most popular method for user authenticat...
research
01/19/2022

Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges

Advances of emerging Information and Communications Technology (ICT) tec...
research
08/12/2020

Information Verification for Humanitarians: A Critical Review

Quality humanitarian information is essential for efficient, effective a...
research
03/06/2022

Automated License Plate Recognition: A Survey on Methods and Techniques

With the explosive growth in the number of vehicles in use, automated li...

Please sign up or login with your details

Forgot password? Click here to reset