U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Nolan's Stage Model and Computer Security (From Electronic Crime Countermeasures, P 45-50, 1986, John S Jackson, ed. See NCJ-102815)

NCJ Number
102817
Author(s)
E Orlandi
Date Published
1986
Length
6 pages
Annotation
This paper describes a structured (layered) approach to risk analysis and links it to Nolan's stage model for computing evolution in organizations.
Abstract
Computer security is a global objective that incorporates several subobjectives or attributes. An indepth analysis of the concept of computer-security factorings points out its major components: reliability, integrity, vulnerability, confidentiality, and privacy. These attributes can be arranged in a recurring and abstract definition of computer security in the formula of an inclusive chain. This inclusive specification minimizes conflicts among attributes, including internal security conflicts (those among access control measures), personal security of personnel, and conflicts among data integrity (backup copies) and confidentiality (multiple copies of protected data). By applying appropriate definitions to security attributes, it is possible to map each attribute onto a corresponding stage of Nolan's model. Thus, the development of information systems is isomorphic to the particular aspect of their security for the stages of initiation, contagion, control, integration, and data administration. Only Nolan's final stage (maturity) requires redefinition of the security concept in terms of security engineering as a solution to external security conflicts arising from concurrent access and deadlock. 2 figures and 5 references.

Downloads

No download available

Availability