skip to main content
10.1145/1328057.1328067acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicegovConference Proceedingsconference-collections
research-article

Formal threat descriptions for enhancing governmental risk assessment

Published: 10 December 2007 Publication History

Abstract

Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history of IT systems in the governmental sector and the connection of these legacy systems to newer technologies, most governmental institutions are faced with a heterogeneous IT environment. More and more governmental duties and responsibilities rely solely on IT systems which have to be highly dependable to ensure the proper operation of these governmental services. An increasing amount of software vulnerabilities and the generally heightened physical threat level due to terror attacks and natural disasters demand for a holistic IT security approach which captures, manages, and secures the entire governmental IT infrastructure. Our contribution is (1) a novel inventory solution, (2) a mechanism to embed the virtual IT infrastructure data into a physical model provided by our security ontology, and (3) a methodology to automatically identify threatened assets and to reason on the current security status based on formal threat definitions taking software configurations and physical locations into account. A prototypical implementation of the aforementioned concepts shows how these concepts help governmental institutions to secure their IT infrastructure in a holistic and systematic way to fortify their IT systems in an appropriate way against current and future threats.

References

[1]
CERT/CC. Cert/cc statistics 1988-2006. http://www.cert.org/stats/, January 2007.
[2]
Commission of the European Communities. Communication from the commission to the council, the european parliament, the european economic and social committee and the committee of the regions 'i2010 -- a european information society for growth and employment'. COM(2005) 229 final, June 2005
[3]
A. Ekelhart, S. Fenz, M. Klemen, and E. Weippl. Security ontologies: Improving quantitative risk analysis. In 40th Hawaii International Conference on System Sciences (HICSS'07), pages 156--162, 2007. IEEE Computer Society.
[4]
S. Fenz, G. Goluch, A. Ekelhart, and E. Weippl. Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. In 13th Pacific Rim International Symposium on Dependable Computing, PRDC2007. IEEE Computer Society, December 2007.
[5]
Hewlett-Packard Development Company. JENA semantic web framework. http://jena.sourceforge.net/, August 2007.
[6]
International Organization for Standardization and International Electrotechnical Commission. Iso/iec 27001:2005, information technology -- security techniques - information security management systems requirements.
[7]
I. LLC. Nmap security scanner. http://insecure.org/nmap/, June 2007.
[8]
Microsoft Corporation. Windows server update services. http://www.microsoft.com/germany/windowsserver2003/technologien/updateservices/default.mspx, June 2007.
[9]
NIST. An introduction to computer security - the nist handbook. Technical report, NIST (National Institute of Standards and Technology), October 1995. Special Publication 800-12.

Cited By

View all

Index Terms

  1. Formal threat descriptions for enhancing governmental risk assessment

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICEGOV '07: Proceedings of the 1st international conference on Theory and practice of electronic governance
      December 2007
      471 pages
      ISBN:9781595938220
      DOI:10.1145/1328057
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 10 December 2007

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. formal threat descriptions
      2. inventory
      3. security ontology

      Qualifiers

      • Research-article

      Conference

      ICEGOV '07

      Acceptance Rates

      ICEGOV '07 Paper Acceptance Rate 33 of 130 submissions, 25%;
      Overall Acceptance Rate 350 of 865 submissions, 40%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 25 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media