Constructing an architecture-based cybersecurity solution for a system
dc.creator | Mora Castro, Alejandro | |
dc.creator | González Herrera, Andrés | |
dc.creator | Villalón Fonseca, Ricardo | |
dc.date.accessioned | 2023-02-02T14:13:21Z | |
dc.date.available | 2023-02-02T14:13:21Z | |
dc.date.issued | 2023-01-19 | |
dc.description.abstract | Cybersecurity can be effectively managed with an architecture-based approach, composed with three viewpoints, namely system, security and process. Using models for describing a system and its security objectives enables a systemic and exhaustive risk management process. The architecture approach produces an integral set of security policies and controls that can be fully maintained during the entire system life-cycle. Furthermore, architecture models support automation and high scalability, thus providing an innovative way for constructing and maintaining the cybersecurity for very large systems or even for system of systems. This work describes details, technical aspects, and examples for the risk management process of the architecture, including the establishment of the system representation, the security goals, going through risk identification and analysis, up to the policies and control definition. Some highlighting points of the methodology follow. • System representation is simple because it focuses only on aspects relevant to security purposes. • Security objectives behave as an end-to-end guidance of the security, for the whole system and also during its life-cycle. • Risk management can be done with existing methods and standards, but additionally supported with the comprehensive capability provided by the system representation and the security objectives. | es_ES |
dc.description.procedence | UCR::Vicerrectoría de Investigación::Unidades de Investigación::Ingeniería::Centro de Investigaciones en Tecnologías de Información y Comunicación (CITIC) | es_ES |
dc.description.procedence | UCR::Vicerrectoría de Docencia::Ingeniería::Facultad de Ingeniería::Escuela de Ciencias de la Computación e Informática | es_ES |
dc.identifier.codproyecto | 834-B9095 | |
dc.identifier.doi | https://doi.org/10.1016/j.mex.2023.102010 | |
dc.identifier.issn | 2215-0161 | |
dc.identifier.uri | https://hdl.handle.net/10669/88126 | |
dc.language.iso | eng | es_ES |
dc.rights | acceso abierto | |
dc.rights.uri | http://creativecommons.org/licenses/by-nd/4.0/ | * |
dc.source | MethodsX, Volume 10, 102010, 2023 | es_ES |
dc.subject | Information security architecture | es_ES |
dc.subject | Cybersecurity architecture | es_ES |
dc.subject | Information security methodology | es_ES |
dc.subject | Cybersecurity methodology | es_ES |
dc.subject | Risk management | es_ES |
dc.title | Constructing an architecture-based cybersecurity solution for a system | es_ES |
dc.type | artículo original | es_ES |
Archivos
Bloque original
1 - 1 de 1
Cargando...
- Nombre:
- PIIS2215016123000158.pdf
- Tamaño:
- 2.26 MB
- Formato:
- Adobe Portable Document Format
- Descripción:
- Main article
Bloque de licencias
1 - 1 de 1
Cargando...
- Nombre:
- license.txt
- Tamaño:
- 3.5 KB
- Formato:
- Item-specific license agreed upon to submission
- Descripción: