Carnegie Mellon University
file.pdf (540.44 kB)

Modeling and Analysis of Information Technology Change and Access Controls in the Business Context

Download (540.44 kB)
posted on 2007-03-01, 00:00 authored by Andrew P. Moore, Rohit S. Antao
Ongoing field work centered at the Information Technology Process Institute (ITPI) makes clear that processes that control change and access within information technology (IT) management and operations simultaneously reduce security risk and increase efficiency and effectiveness. The CERT's Coordination Center is building on this work. This technical note describes a system dynamics model that embodies CERT's current hypothesis of why and how these controls reduce the problematic behavior of the low-performing IT operation. CERT has also started to extend the model in ways that reflect the improved performance seen by high performers. In the longer term, the hope is that this model will help to specify, explain, and justify a prescriptive process for integrating change and access controls into organizations' business processes in a way that most effectively reduces security risk and increases IT operational effectiveness and efficiency.




Usage metrics