Advanced Search

Content Type

Topics

Publication Date

Modeling and Analysis of Information Technology Change and Access Controls in the Business Context

  • Author(s): Andrew P. Moore, Rohit S. Antao
  • Publish Date:
  • Publisher: Software Engineering Institute
  • SEI Identifier: CMU/SEI-2006-TN-040
  • Type: Technical Note
  • Topics: Insider Threat
  • Description: In this report, the authors describe progress in developing a system dynamics model of typical use of change and access controls to support IT operations.

Abstract

Ongoing field work centered at the Information Technology Process Institute (ITPI) makes clear that processes that control change and access within information technology (IT) management and operations simultaneously reduce security risk and increase efficiency and effectiveness. The CERT's Coordination Center is building on this work. This technical note describes a system dynamics model that embodies CERT's current hypothesis of why and how these controls reduce the problematic behavior of the low-performing IT operation. CERT has also started to extend the model in ways that reflect the improved performance seen by high performers. In the longer term, the hope is that this model will help to specify, explain, and justify a prescriptive process for integrating change and access controls into organizations' business processes in a way that most effectively reduces security risk and increases IT operational effectiveness and efficiency.

Cite This Report

Show Citation Formats

SEI

Moore, Andrew; & Antao, Rohit. Modeling and Analysis of Information Technology Change and Access Controls in the Business Context (CMU/SEI-2006-TN-040). Software Engineering Institute, Carnegie Mellon University, 2007. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=8025

IEEE

Moore. Andrew, and Antao. Rohit, "Modeling and Analysis of Information Technology Change and Access Controls in the Business Context," Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, Technical Note CMU/SEI-2006-TN-040, 2007. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=8025

APA

Moore, Andrew., & Antao, Rohit. (2007). Modeling and Analysis of Information Technology Change and Access Controls in the Business Context (CMU/SEI-2006-TN-040). Retrieved October 20, 2014, from the Software Engineering Institute, Carnegie Mellon University website: http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=8025

CHI

Andrew Moore, & Rohit Antao. Modeling and Analysis of Information Technology Change and Access Controls in the Business Context (CMU/SEI-2006-TN-040). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2007. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=8025

MLA

Moore, Andrew., & Antao, Rohit. 2007. Modeling and Analysis of Information Technology Change and Access Controls in the Business Context (Technical Report CMU/SEI-2006-TN-040). Pittsburgh: Software Engineering Institute, Carnegie Mellon University. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=8025