INFORMATION ASSURANCE ASSET MANAGEMENT
ARCHITECTURE USING XML FOR SYSTEM VULNERABILITY
Namho Yoo, Hyeong-Ah Choi
Department of Computer Science, The George Washington University,
801 22
nd
Street, N.W., Room 730, Washington, DC 20052, USA
Keywords: Asset Management, XML, Vulnerability, Information Assurance, System Engineering, Risk Management.
Abstract: This paper suggests an XML-based IA asset management architecture for system vulnerability. Once an
information assurance vulnerability notice is given for a system, it is important for reducing massive system
engineering efforts for IA asset management. When systems are updated by security patch for mitigating
system vulnerability, asset management based on vulnerability update and request is trivial, in order to
increase accuracy, efficiency and effectiveness of software processes. By employing XML technology, we
can achieve seamless and efficient asset management between heterogeneous system format as well as data
formats in analysing and exchanging the pertinent information for information assurance vulnerability.
Thus, when a system is updated to improve system vulnerability, we proposed XML-based IA asset
management architecture. Then, an executable architecture for implementation to verify the proposed
scheme and testing environment is presented to mitigate vulnerable systems for sustained system.
1 INTRODUCTION
Information Assurance (IA) issues are one of hot
areas among information technology management.
IA asset management have become increasingly
important because there are continuous changes in
components of IA management. IA assets should
contain all components such as objects or artefacts
associated with IA. Among IA issues, system
vulnerability management is addressed specifically
in this paper. The basic intensions are to recognize
the components of systems for IA asset management
and propose IA asset management framework for
system vulnerability.
In a sustained system, IA asset management
architecture aims to help solve engineering issue of
reducing efforts and producing better approach for
mitigating system vulnerability. If IA asset
management requirement for system vulnerability
has an ongoing feature to be considered, even after
implementing the change, the management efforts
are still required for continued decision-making.
(Yoo, 2004)
To maintain systems vulnerability is challenged
efforts to the System Engineer and Information
Assurance Specialist. All these activities are
manually labor intensive and can consume several
minutes to hours of time and effort, especially in
sustained systems. Therefore it is necessary to build
simple and powerful way to handle this.
In order to use asset data proactively, to build
negotiable data using designated format is used
more quickly that are less costly. Thus, in this paper,
asset management architecture using XML is
suggested. XML offers the advantages of the ease
of displaying data in electronic or printed form and
enhanced transportability of the asset data. For
example, these XML files hold information
regarding the system administration support
personnel information such as name , contract status,
scope of access, and so on. It is proposed to build
IA asset management architecture using XML for
managing system vulnerability notice more
efficiently and effectively.
This approach is based on XML representation,
with improving the impact analysis for IAVM with
applying IAVN. The analysis uses a case study in
the globally deployed health systems, which were
analyzed manually by IA Engineers. An efficient
scheme impact analysis scheme using IA
vulnerability is discussed whether or not a
vulnerability notice can be applied to the systems
without causing any negative impact.
The rest of this paper is organized as follows:
Section 2 briefly describes background and problem
statement. Section 3 presents asset management
534
Yoo N. and Choi H. (2006).
INFORMATION ASSURANCE ASSET MANAGEMENT ARCHITECTURE USING XML FOR SYSTEM VULNERABILITY.
In Proceedings of the Eighth International Conference on Enterprise Information Systems - ISAS, pages 534-537
DOI: 10.5220/0002457105340537
Copyright
c
SciTePress