Organisational security requirements : an agile approach to ubiquitous information security

Ruighaver, A.B. 2008, Organisational security requirements : an agile approach to ubiquitous information security, in Proceedings of 6th Australian Information Security Management Conference, Edith Cowan University, Perth, W.A., pp. 1-7.

Attached Files
Name Description MIMEType Size Downloads

Title Organisational security requirements : an agile approach to ubiquitous information security
Author(s) Ruighaver, A.B.
Conference name Australian Information Security Management Conference (6th : 2008 : Perth, Western Australia)
Conference location Perth, Western Australia
Conference dates 1-3rd December 2008
Title of proceedings Proceedings of 6th Australian Information Security Management Conference
Editor(s) Valli, Craig
Woodward, Andre
Publication date 2008
Conference series Australian Information Security Management Conference
Start page 1
End page 7
Publisher Edith Cowan University
Place of publication Perth, W.A.
Keyword(s) security requirement engineering
agile security
ubiquitous security
ubiquitous identity management
wireless intrusion detection
Summary This paper proposes to address the need for more innovation in organisational information security by adding a security requirement engineering focus. Based on the belief that any heavyweight security requirements process in organisational security will be doomed to fail, we developed a security requirement approach with three dimensions. The use of a simple security requirements process in the first dimension has been augmented by an agile security approach. However, introducing this second dimension of agile security does provide support for, but does not necessarily stimulate, innovation. A third dimension is, therefore, needed to ensure there is a proper focus in the organisation's efforts to identify potential new innovations in their security. To create this focus three common shortcomings in organisational information security have been identified. The resulting security approach that addresses these shortcomings is called Ubiquitous Information Security. This paper will demonstrate the potential of this new approach by briefly discussing its possible application in two areas: Ubiquitous Identity Management and Ubiquitous Wireless Security.
ISBN 9780729806657
Language eng
Field of Research 080609 Information Systems Management
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2008, Edith Cowan University
Persistent URL http://hdl.handle.net/10536/DRO/DU:30018301

Document type: Conference Paper
Collection: School of Information and Business Analytics
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 377 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Fri, 14 Aug 2009, 14:07:04 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.