An Information Security Management for Socio-Technical Analysis of System Security

被引:0
|
作者
Huynen, Jean-Louis [1 ]
Lenzini, Gabriele [1 ]
机构
[1] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust SnT, Esch Sur Alzette, Luxembourg
来源
INFORMATION SYSTEMS SECURITY AND PRIVACY | 2018年 / 867卷
关键词
Socio-technical security; Information Security Management and Reasoning; Root Cause Analysis;
D O I
10.1007/978-3-319-93354-2_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Concerned about the technical and social aspects at the root causes of security incidents and how they can hide security vulnerabilities we propose a methodology compatible with the Information Security Management life-cycle. Retrospectively, it supports analysts to reason about the socio-technical causes of observed incidents; prospectively, it helps designers account for human factors and remove potential socio-technical vulnerabilities from a system's design. The methodology, called S.CREAM, stems from practices in safety, but because of key differences between the two disciplines migrating concepts, techniques, and tools from safety to security requires a complete re-thinking. S.CREAM is supported by a tool, which we implemented. When available online it will assist security analysts and designers in their tasks. Using S.CREAM, we discuss potential socio-technical issues in the Yubikey's two-factor authentication device.
引用
收藏
页码:222 / 251
页数:30
相关论文
共 50 条
  • [11] Formal Methods for Socio-technical Security (Formal and Automated Analysis of Security Ceremonies)
    Vigano, Luca
    COORDINATION MODELS AND LANGUAGES, 2022, 13271 : 3 - 14
  • [12] Socio-Technical Determinants of Information Security Perceptions in US Local Governments
    Shin, Eunjung
    Welch, Eric W.
    INTERNATIONAL JOURNAL OF ELECTRONIC GOVERNMENT RESEARCH, 2016, 12 (03) : 1 - 20
  • [13] Socio-technical issues and challenges in cyber security
    Sadok, Moufida
    Bednar, Peter
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (03) : 397 - 398
  • [14] Service security and privacy as a socio-technical problem
    Bella, Giampaolo
    Curzon, Paul
    Lenzini, Gabriele
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (05) : 563 - 585
  • [15] Studies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates
    Ferreira, Ana
    Giustolisi, Rosario
    Huynen, Jean-Louis
    Koenig, Vincent
    Lenzini, Gabriele
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1553 - 1558
  • [16] Managing Security Requirements Conflicts in Socio-Technical Systems
    Paja, Elda
    Dalpiaz, Fabiano
    Giorgini, Paolo
    CONCEPTUAL MODELING, ER 2013, 2013, 8217 : 270 - +
  • [17] Special issue on socio-technical aspects in security - editorial
    Gross, Thomas
    Vigano, Luca
    JOURNAL OF COMPUTER SECURITY, 2022, 30 (03) : 325 - 326
  • [18] Preserving compliance with security requirements in socio-technical systems
    Salnitri, Mattia
    Paja, Elda
    Giorgini, Paolo
    Communications in Computer and Information Science, 2014, 470 : 49 - 61
  • [19] A Socio-Technical Regime Transitions Model for Gerontechnology Service Design: Privacy, Information Security and Cyber Security in Focus
    Kowalski, Stewart James
    Ostby, Grethe
    PHEALTH 2022, 2022, 299 : 20 - 29
  • [20] A socio-technical lens on security in sustainability transitions: Future expectations for positive and negative security
    Kivimaa, Paula
    Brisbois, Marie Claire
    Jayaram, Dhanasree
    Hakala, Emma
    Siddi, Marco
    FUTURES, 2022, 141