A survey on common criteria (CC) evaluating schemes for security assessment of IT products

Author:

Fatima Maheen1,Abbas Haider1ORCID,Yaqoob Tahreem1,Shafqat Narmeen1,Ahmad Zarmeen1,Zeeshan Raja1,Muhammad Zia1,Rana Tauseef2,Mussiraliyeva Shynar3

Affiliation:

1. Department of Information Security, National University of Sciences and Technology, Islamabad, Pakistan

2. Department of Software Engineering, National University of Sciences and Technology, Islamabad, Pakistan

3. Al-Farabi Kazakh National University, Almaty, Kazakhstan

Abstract

Over the last few years, private and public organizations have suffered an increasing number of cyber-attacks owing to excessive exploitation of technological vulnerabilities. The major objective of these attacks is to gain illegal profits by extorting organizations which adversely impact their normal operations and reputation. To mitigate the proliferation of attacks, it is significant for manufacturers to evaluate their IT products through a set of security-related functional and assurance requirements. Common Criteria (CC) is a well-recognized international standard, focusing on ensuring security functionalities of an IT product along with the special emphasis on IS design and life-cycle. Apart from this, it provides a list of assurance classes, families, component, and elements based on which security EALs can be assigned to IT products. In this survey, we have provided a quick overview of the CC followed by the analysis of country-specific implementation of CC schemes to develop an understanding of critical factors. These factors play a significant role by providing assistance in IT products evaluation in accordance with CC. To serve this purpose, a comprehensive comparative analysis of four schemes belonging to countries including US, UK, Netherlands, and Singapore has been conducted. This comparison has aided to propose best practices for realizing an efficient and new CC scheme for the countries which have not designed it yet and for improving the existing CC schemes. Finally, we conclude the paper by providing some future directions regarding automation of the CC evaluation process.

Funder

Higher Education Commission

National Center for Cyber Security for the affiliated lab National Cyber Security Auditing and Evaluation Lab

Publisher

PeerJ

Subject

General Computer Science

Reference42 articles.

1. Software support of the common criteria vulnerability assessment;Bialas,2017

2. Common criteria it security evaluation methodology—an ontological approach;Bialas,2018

3. Part 3: Security assurance components v 3.1 r5;Common-Criteria,2017

4. The security challenges emerging from the technological developments;Costa;Mobile Networks and Applications,2019

5. Standard certification work programme, standard CWP, issue 2.2;CWP,2013

Cited by 11 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3