Utilizing security requirements engineering methods for operational security maintenance purposes

被引:0
|
作者
Abuosba, Khalil
El-Sheikh, Asim
Martin, Clemens
机构
关键词
security; fault; event; trees; maintenance;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secure systems are achieved by implementing appropriate controls and policies specified based on appropriate selection of minimum security requirements. Maintaining security for these systems is a major challenge. Systems may encounter threats that may arise due to exploitation of vulnerabilities or due to programming flaws. In this work we address security requirements engineering approaches and focus primarily on methods that may be utilized for the purpose of investigating incidents. We have shown empirically that threats may be identified by using methods such as faults trees; and systematically that by using other methods such as events trees, incidents may be avoided or prevented.
引用
收藏
页码:1763 / 1767
页数:5
相关论文
共 50 条
  • [41] Security requirements engineering: When anti-requirements hit the fan
    Crook, R
    Ince, D
    Lin, LC
    Nuseibeh, B
    IEEE JOINT INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2002, : 203 - 205
  • [42] STORE: Security Threat Oriented Requirements Engineering Methodology
    Ansari, Md Tarique Jamal
    Pandey, Dhirendra
    Alenezi, Mamdouh
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (02) : 191 - 203
  • [43] Security Guidelines: Requirements Engineering for Verifying Code Quality
    Zhioua, Zeineb
    Roudier, Yves
    Short, Stuart
    Ameur, Rabea Boulifa
    2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2016, : 80 - 85
  • [44] BPMN extension evaluation for security requirements engineering framework
    Zareen, Saima
    Anwar, Syed Muhammad
    REQUIREMENTS ENGINEERING, 2024, 29 (02) : 261 - 278
  • [45] A Systematic Mapping Study on Security in Agile Requirements Engineering
    Villamizar, Hugo
    Kalinowski, Marcos
    Viana, Marx
    Fernandez, Daniel Mendez
    44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, : 454 - 461
  • [46] An approach to security requirements engineering for a high assurance system
    Irvine C.E.
    Levin T.
    Wilson J.D.
    Shifflett D.
    Pereira B.
    Requirements Engineering, 2002, 7 (4) : 192 - 206
  • [47] An Ontology Based Information Security Requirements Engineering Framework
    Chikh, Azeddine
    Abulaish, Muhammad
    Nabi, Syed Irfan
    Alghathbar, Khaled
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 139 - +
  • [48] Security & Safety by Model-based Requirements Engineering
    Japs, Sergej
    2020 28TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE'20), 2020, : 422 - 427
  • [49] A Serious Game for Eliciting Social Engineering Security Requirements
    Beckers, Kristian
    Pape, Sebastian
    2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 16 - 25
  • [50] Security Requirements Engineering in the Wild: A Survey of Common Practices
    Elahi, Golnaz
    Yu, Eric
    Li, Tong
    Liu, Lin
    2011 35TH IEEE ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2011, : 314 - 319