An Information Security Management for Socio-Technical Analysis of System Security

被引:0
|
作者
Huynen, Jean-Louis [1 ]
Lenzini, Gabriele [1 ]
机构
[1] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust SnT, Esch Sur Alzette, Luxembourg
来源
INFORMATION SYSTEMS SECURITY AND PRIVACY | 2018年 / 867卷
关键词
Socio-technical security; Information Security Management and Reasoning; Root Cause Analysis;
D O I
10.1007/978-3-319-93354-2_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Concerned about the technical and social aspects at the root causes of security incidents and how they can hide security vulnerabilities we propose a methodology compatible with the Information Security Management life-cycle. Retrospectively, it supports analysts to reason about the socio-technical causes of observed incidents; prospectively, it helps designers account for human factors and remove potential socio-technical vulnerabilities from a system's design. The methodology, called S.CREAM, stems from practices in safety, but because of key differences between the two disciplines migrating concepts, techniques, and tools from safety to security requires a complete re-thinking. S.CREAM is supported by a tool, which we implemented. When available online it will assist security analysts and designers in their tasks. Using S.CREAM, we discuss potential socio-technical issues in the Yubikey's two-factor authentication device.
引用
收藏
页码:222 / 251
页数:30
相关论文
共 50 条
  • [21] Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach
    Li, Tong
    Horkoff, Jennifer
    ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2014), 2014, 8484 : 285 - 300
  • [22] IoT Security Adoption into Business Processes: A Socio-Technical View
    Kavyashree, G. C.
    Karimi-Alaghehband, Forough
    Ozgun, Desiree
    AMCIS 2017 PROCEEDINGS, 2017,
  • [23] Modelling and reasoning about security requirements in socio-technical systems
    Paja, Elda
    Dalpiaz, Fabiano
    Giorgini, Paolo
    DATA & KNOWLEDGE ENGINEERING, 2015, 98 : 123 - 143
  • [24] A real-world information security performance assessment using a multidimensional socio-technical approach
    Prislan, Kaja
    Mihelic, Anze
    Bernik, Igor
    PLOS ONE, 2020, 15 (09):
  • [25] Information security governance practices in critical infrastructure organizations: A socio-technical and institutional logic perspective
    Williams, Susan P.
    Hardy, Catherine A.
    Holgate, Janine A.
    ELECTRONIC MARKETS, 2013, 23 (04) : 341 - 354
  • [26] Information security governance practices in critical infrastructure organizations: A socio-technical and institutional logic perspective
    Susan P. Williams
    Catherine A. Hardy
    Janine A. Holgate
    Electronic Markets, 2013, 23 : 341 - 354
  • [27] Security as Socio-Technical Practice: Predictive Policing and (Non-)Automation
    Leese, Matthias
    SWISS POLITICAL SCIENCE REVIEW, 2021, 27 (01) : 150 - 157
  • [28] The socio-technical security requirements modelling language for secure composite services
    Paja, Elda
    Dalpiaz, Fabiano
    Giorgini, Paolo
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8900 : 63 - 78
  • [29] Structured Reasoning for Socio-Technical Factors of Safety-Security Assurance
    Johnson, Nikita
    Kelly, Tim
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2019, 2019, 11699 : 178 - 184
  • [30] Achieving Socio-Technical Confidentiality using Security Pattern in Smart Homes
    Busnel, Pierre
    El-Khoury, Paul
    Giroux, Sylvain
    Li, Keqin
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 925 - +