Modelling the Enemies of an IT Security System - A Socio-Technical System Security Model

被引:0
|
作者
Kowalski, Stewart [1 ]
Mwakalinga, Jeffy [1 ]
机构
[1] Stockholm Univ, Dept Comp & Syst Sci, S-16440 Kista, Sweden
关键词
Enemy of IT; deterrence; prevention; detection; response; socio-technical model; center of gravity;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a socio-technical security model for security systems that include both the system being defended and the attacking system. We first model security as a ratio or function of the states that an attacker can produce over the states that defend can control. We then sub divided the control states of a defending systems using the security value chain and socio technical system security model. The paper then presents two attempts to validate the acceptance of the defense model using cross culture surveys of individuals from over 20 different countries indicate culture variation in security modeling. An example of how an attacker can model an attack strategy is given at the end of the paper. The paper concludes with a discussion of how the modeling can be new research in modeling criminal organization using effective based operations methodology.
引用
收藏
页码:251 / 256
页数:6
相关论文
共 50 条
  • [1] An Information Security Management for Socio-Technical Analysis of System Security
    Huynen, Jean-Louis
    Lenzini, Gabriele
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 222 - 251
  • [2] Modelling and reasoning about security requirements in socio-technical systems
    Paja, Elda
    Dalpiaz, Fabiano
    Giorgini, Paolo
    [J]. DATA & KNOWLEDGE ENGINEERING, 2015, 98 : 123 - 143
  • [3] Modelling Static and Dynamic Aspects of Security: A Socio-Technical View on Information Security Metrics
    Kowalski, Stewart
    Barabanov, Rostyslav
    [J]. IMCIC'11: THE 2ND INTERNATIONAL MULTI-CONFERENCE ON COMPLEXITY, INFORMATICS AND CYBERNETICS, VOL I, 2011, : 246 - 250
  • [4] A Socio-Technical Investigation into Smartphone Security
    Volkamer, Melanie
    Renaud, Karen
    Kulyk, Oksana
    Emeroez, Sinem
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2015), 2015, 9331 : 265 - 273
  • [5] A Socio-Technical Approach to Information Security
    Mujinga, Mathias
    Eloff, Mariki M.
    Kroeze, Jan H.
    [J]. AMCIS 2017 PROCEEDINGS, 2017,
  • [6] Modelling and Analysis of Socio-Technical System of Systems
    Lock, Russell
    Sommerville, Ian
    [J]. 2010 15TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2010), 2010, : 224 - 232
  • [7] The socio-technical security requirements modelling language for secure composite services
    University of Trento – DISI, Via Sommarive 5, Povo, Trento
    38123, Italy
    不详
    3584 CC, Netherlands
    [J]. Lect. Notes Comput. Sci., (63-78):
  • [8] Understanding Security Patterns for Socio-Technical Systems via Responsibility Modelling
    Blyth, Andrew
    [J]. 2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 417 - 421
  • [9] Security analysis of socio-technical physical systems
    Lenzini, Gabriele
    Mauw, Sjouke
    Ouchani, Samir
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2015, 47 : 258 - 274
  • [10] Socio-technical issues and challenges in cyber security
    Sadok, Moufida
    Bednar, Peter
    [J]. INFORMATION AND COMPUTER SECURITY, 2020, 28 (03) : 397 - 398