Hardware Security Risk Assessment: A Case Study

被引:0
|
作者
Sherman, Brent [1 ]
Wheeler, David [1 ]
机构
[1] Intel Corp, Secur Ctr Excellence Grp, Hillsboro, OR 97124 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security demands on development teams are growing in direct proportion to the security incidents discovered and leveraged in computer crime and cyber warfare every day. There is ongoing research to increase the effectiveness of security defect detection and penetration testing of products, but where the literature is thin, is in actual case studies that apply security assurance processes in a large-scale hardware-centric environment. This paper adds to the literature by providing an actual case study of hardware security assurance practices using a sample size of 151 projects. Furthermore, it documents and analyzes the efficacy of deploying selective automation using quantitative weighted risk ratings of the Security Development Lifecycle (SDL) to hardware projects, including strategic reuse of existing SDL collaterals for derivative projects. The evaluated methodology provided acceptable accuracy and labor savings, but the results indicate that automation focusing on assignment of a quantitative risk scoring introduces a dilution of real security concerns; instead, an approach using qualitative analysis and assignment of security assurance tasks is more beneficial.
引用
收藏
页码:179 / 184
页数:6
相关论文
共 50 条
  • [1] Risk assessment of digital library information security: a case study
    Han, Zhengbiao
    Huang, Shuiqing
    Li, Huan
    Ren, Ni
    [J]. ELECTRONIC LIBRARY, 2016, 34 (03): : 471 - 487
  • [2] Security Risk Assessment of Server Hardware Architectures using Graph Analysis
    Koteshwara, Sandhya
    [J]. PROCEEDINGS OF THE 2021 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2021,
  • [3] Cyber security risk assessment for seaports: A case study of a container port
    Gunes, Bunyamin
    Kayisoglu, Gizem
    Bolat, Pelin
    [J]. COMPUTERS & SECURITY, 2021, 103
  • [4] Quantitative Security Risk Assessment (SRA) Method: An empirical case study
    Bernardo, Danilo Valeros
    Chua, Bee Bee
    Hoang, Doan
    [J]. 2009 WORLD CONGRESS ON NATURE & BIOLOGICALLY INSPIRED COMPUTING (NABIC 2009), 2009, : 971 - +
  • [5] Security Risk Assessment for Patient Portals of Hospitals: A Case Study of Taiwan
    Yeh, Pei-Cheng
    Yeh, Kuen-Wei
    Huang, Jiun-Lang
    [J]. RISK MANAGEMENT AND HEALTHCARE POLICY, 2024, 17 : 1647 - 1656
  • [6] A Case Study of Introducing Security Risk Assessment in Requirements Engineering in a Large Organization
    Ardi S.
    Sandahl K.
    Gustafsson M.
    [J]. SN Computer Science, 4 (5)
  • [7] A Study of Information Security Evaluation and Risk Assessment
    Li, Jingyi
    Chao, Shiwei
    Huo, Minxia
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1909 - 1912
  • [8] Information Security Culture Assessment: Case Study
    Al-Mayahi, Ibrahim
    Mansoor, Sa'ad P.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 789 - 792
  • [9] Hardware Attack Risk Assessment
    Moein, Samer
    Gebali, Fayez
    Gulliver, T. Aaron
    El-Kharashi, M. Watheq
    [J]. 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 346 - 350
  • [10] Security Risk Management in Healthcare: A Case Study
    Zafar, Humayun
    Ko, Myung S.
    Clark, Jan G.
    [J]. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2014, 34 : 737 - 750