Affiliation:
1. Department of Information Security, National University of Sciences and Technology, Islamabad, Pakistan
2. Department of Software Engineering, National University of Sciences and Technology, Islamabad, Pakistan
3. Al-Farabi Kazakh National University, Almaty, Kazakhstan
Abstract
Over the last few years, private and public organizations have suffered an increasing number of cyber-attacks owing to excessive exploitation of technological vulnerabilities. The major objective of these attacks is to gain illegal profits by extorting organizations which adversely impact their normal operations and reputation. To mitigate the proliferation of attacks, it is significant for manufacturers to evaluate their IT products through a set of security-related functional and assurance requirements. Common Criteria (CC) is a well-recognized international standard, focusing on ensuring security functionalities of an IT product along with the special emphasis on IS design and life-cycle. Apart from this, it provides a list of assurance classes, families, component, and elements based on which security EALs can be assigned to IT products. In this survey, we have provided a quick overview of the CC followed by the analysis of country-specific implementation of CC schemes to develop an understanding of critical factors. These factors play a significant role by providing assistance in IT products evaluation in accordance with CC. To serve this purpose, a comprehensive comparative analysis of four schemes belonging to countries including US, UK, Netherlands, and Singapore has been conducted. This comparison has aided to propose best practices for realizing an efficient and new CC scheme for the countries which have not designed it yet and for improving the existing CC schemes. Finally, we conclude the paper by providing some future directions regarding automation of the CC evaluation process.
Funder
Higher Education Commission
National Center for Cyber Security for the affiliated lab National Cyber Security Auditing and Evaluation Lab
Reference42 articles.
1. Software support of the common criteria vulnerability assessment;Bialas,2017
2. Common criteria it security evaluation methodology—an ontological approach;Bialas,2018
3. Part 3: Security assurance components v 3.1 r5;Common-Criteria,2017
4. The security challenges emerging from the technological developments;Costa;Mobile Networks and Applications,2019
5. Standard certification work programme, standard CWP, issue 2.2;CWP,2013
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献