Validation of the Enhanced Model for Efficient Development of Security Audit Criteria

Abstract:

Cyberattacks have grown in importance to become a matter of national security. Security criteria are important tools for defensive capabilities of critical communications and information systems. An enhanced model for efficient development of security audit criteria has been proposed. This paper provides evidence in support of the validation of the proposed model. The model is validated through case study observations from two criteria development projects that utilised the model during criteria development. The results indicate that the model is useful for criteria development and provides efficiency to such processes. The results also suggest minor improvements for development of the model.


AUTHORS

Photo of Tomi Kelo

Faculty of Information and Communication Sciences Tampere University
Tampere, Finland

National Cyber Security Centre Finland
Finnish Transport and Communications Agency
Helsinki, Finland

Tomi Kelo is working as a Chief Specialist at the Finnish National Cyber Security Centre (NCSC-FI), focusing mainly on information assurance and cybersecurity matters. As a hobby, he is also preparing his doctoral thesis at the Tampere University

Photo of Juhani Eronen

Department of Computer Science and Engineering University of Oulu
Oulu, Finland

National Cyber Security Centre Finland Finnish Communications Regulatory Authority
Helsinki, Finland

Juhani Eronen is a Chief Specialist at the Finnish National Cyber Security Centre (NCSC-FI). For over 25 years he has been intimately involved in research, discovery, and coordination of security vulnerabilities and in incident response. His responsibilities in NCSC-FI include the automation of the nationwide handling of security incidents as well as information assurance.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com