Using the Techniques of a Security Assessment to Guide Technology Development in Education
Download
Author
Stephanie Miller
Tech report number
CERIAS TR 1999-12
Entry type
mastersthesis
Abstract
The goal of this thesis is to structure and present the complete process involved in implementing a security assessment. Our objective is to capture the essence of a successful security assessment. We will not only document best practices, but will outline such an assessment for a project underway in the School of Education and funded by the State of Indiana. That project promotes improved evaluation of special needs students.
The result of this work has been a concrete example of a security assessment methodology as well as a documented process that can be utilized as a template in future assessments.the assessment techniques we recommend in this thesis include project examination, threat analysis, modeling of data flows, and development of a security architecture.
Other topics we will address throughout the document include fundamental security precautions, such as ensuring confidentiality, integrity, and availability.
We will offer insight on dissemination of results to project sponsors and users to encourage the effectiveness of the deliverales produced during a security assessment.
Download
Date
1999
Institution
CERIAS, Department of Computer Sciences, Purdue University
Key alpha
miller
School
Purdue University
Publication Date
1900-01-01
Contents
1. Introduction
2. Setting the Stage: Introducing IASEP
3. Fundamentals of Computer Security
4. The Assessment Details
5. The Assessment Methodology Abstracted
6. Conclusions and Lessons Learned
Language
English
Location
A hard-copy of this is in the CERIAS Library

