본문 바로가기
  • Home

Classification Criteria and Application Methodology for Evaluating IT Security Products

  • Journal of Knowledge Information Technology and Systems
  • Abbr : JKITS
  • 2011, 6(5), pp.105-112
  • Publisher : Korea Knowledge Information Technology Society
  • Research Area : Interdisciplinary Studies > Interdisciplinary Research
  • Published : October 31, 2011

방기석 ORD ID 1 김일곤 2 이지연 3 이준석 3 CHOIJinYoung 4

1한림대학교
2한국인터넷진흥원
3동남보건대학교
4고려대학교

Candidate

ABSTRACT

CC(Common Criteria) requires to collect vulnerability information and vulnerability analysis by using penetration testing for evaluating IT security products. However, CC has been criticized from developers or QA managers due to its complexity of terms, abstract description of evaluation methods and non-existence of guidelines. In this paper, we propose a guideline of vulnerability assessment for developers and evaluators by analyzing and summarizing of its requirements and processes defined in CC. To do this, we classify the evaluation process of AVA assurance family into 4 parts and describe each evaluation working systematically unit under every steps.

Citation status

* References for papers published after 2023 are currently being built.