Utilizing security requirements engineering methods for operational security maintenance purposes

被引:0
|
作者
Abuosba, Khalil
El-Sheikh, Asim
Martin, Clemens
机构
关键词
security; fault; event; trees; maintenance;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secure systems are achieved by implementing appropriate controls and policies specified based on appropriate selection of minimum security requirements. Maintaining security for these systems is a major challenge. Systems may encounter threats that may arise due to exploitation of vulnerabilities or due to programming flaws. In this work we address security requirements engineering approaches and focus primarily on methods that may be utilized for the purpose of investigating incidents. We have shown empirically that threats may be identified by using methods such as faults trees; and systematically that by using other methods such as events trees, incidents may be avoided or prevented.
引用
收藏
页码:1763 / 1767
页数:5
相关论文
共 50 条
  • [1] A comparison of security requirements engineering methods
    Fabian, Benjamin
    Guerses, Seda
    Heisel, Maritta
    Santen, Thomas
    Schmidt, Holger
    REQUIREMENTS ENGINEERING, 2010, 15 (01) : 7 - 40
  • [2] A comparison of security requirements engineering methods
    Benjamin Fabian
    Seda Gürses
    Maritta Heisel
    Thomas Santen
    Holger Schmidt
    Requirements Engineering, 2010, 15 : 7 - 40
  • [3] Operational requirements for security measures
    Spaight, WHT
    34TH ANNUAL 2000 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2000, : 64 - 70
  • [4] Modeling and Utilizing Security Knowledge for Eliciting Security Requirements
    Abe, Tatsuya
    Hayashi, Shinpei
    Saeki, Motoshi
    ADVANCES IN CONCEPTUAL MODELING, ER 2015 WORKSHOPS, 2015, 9382 : 236 - 247
  • [5] Security and trust requirements engineering
    Giorgini, P
    Massacci, F
    Zannone, N
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 237 - 272
  • [6] A study on the security evaluation methods of security function requirements
    Na, HY
    Jeong, JH
    Kim, CS
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 54 - 57
  • [7] An Analysis of Operational Security Requirements for Unmanned Systems
    Britt, Christopher
    Leon, Andre
    Hale, Britta
    NAVAL ENGINEERS JOURNAL, 2024, 136 (03) : 51 - 63
  • [8] Requirements engineering for improving business/IT alignment in security risk management methods
    Mayer, N.
    Dubois, E.
    Rifaut, A.
    ENTERPRISE INTEROPERABILITY II: NEW CHALLENGES AND APPROACHES, 2007, : 15 - 26
  • [9] Survey and analysis on Security Requirements Engineering
    Salini, P.
    Kanmani, S.
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (06) : 1785 - 1797
  • [10] Applying a security requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 192 - 206