Browse > Article

Configuration Management for Multi-Level Security Information Technology Systems  

Kim, Jeom-Goo (남서울대학교 컴퓨터학과)
Publication Information
Abstract
In a complex, secure IT system environment there will be groups of data that be segregated from one another, yet reside on the same system. Users of the system will have varying degrees of access to specific data. The Configuration Management(CM) of the information architecture, the physical architecture, user privileges and application security policies increases the complexity for operations, maintenance and security staff. This pager describes(current work to merge the capabilities of a network CM toll with those of a Computer Aided System Engineering(CASE) tool. The rigour of Systems Engineering(SE) modelling techniques can be used to deal with the complexities of multi-level information security. The SE logical and physical models of the same system are readily tailorable to document the critical components of both the information architecture and physical architecture that needs to be managed. Linking a user-friendly, physical CM tool with the extended capabilities of a CASE tool provide the basis for improved configuration management of secure IT systems.
Keywords
CASE Tools; Security; System Engineering;
Citations & Related Records
연도 인용수 순위
  • Reference
1 netViz, Quyen Systems, nc. 1300 Piccard Drive, Suite 108, Rockville, MD 20850.
2 A Guide to Understanding Configuration in Trusted Systems, National Computer Security Center, NCSC-TG-006 VERSION-1, Vol. 28, March, 1988.
3 Technical Architecture Framework for Information Management, Volume 6 : DoD Goal Security Architecture, Version 2.0, 30, June, 1994.
4 The CASE tool used in this work was: System Architect, Popkin Software and Systems, Inc. 11, Park Place, New York, NY 10007-2801.