Measuring Security: A Step Towards Enhancing Security of System

被引:2
|
作者
Jaiswal, Shruti [1 ]
Gupta, Daya [1 ]
机构
[1] Delhi Technol Univ, Dept Comp Sci & Engn, Delhi, India
关键词
Security Algorithm; Security Engineering; Security Index; Security Testing; Vulnerability Metric;
D O I
10.4018/IJISSS.2018010103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The researchers have been focusing on embedding security from the early phases of software development lifecycle. They have researched and innovated a field of Security Engineering where security concerns are embedded during requirement, design, and testing phases of software development. Efforts were made in developing methods, methodologies, and tools to handle security issues. Various methods are present in the literature for eliciting, analyzing and prioritizing the security requirements. During the design phase based on prioritized requirements, environment parameters and attribute a suitable security algorithm mainly cryptography algorithms are identified. Then a question arises how to test the effectiveness of chosen algorithm? Therefore, as an answer to the issue in this paper, a process for Security Testing is presented that evaluates the selected security algorithms. Evaluation is done by generating the test scenarios for functionalities using sequence diagram representing the threats at vulnerable points. Then, checking the mitigation of potential threats at identified vulnerable points. A security index is generated which shows the effectiveness of deployed/chosen security algorithm. The process ends with the generation of a test report depicting the testing summary. For a clear understanding of the process, the proposal is illustrated with a case study of the cloud storage as a service model.
引用
收藏
页码:28 / 53
页数:26
相关论文
共 50 条
  • [1] Towards enhancing security of IoT-Enabled healthcare system
    Irshad, Reyazur Rashid
    Sohail, Shahab Saquib
    Hussain, Shahid
    Madsen, Dag Oivind
    Zamani, Abu Sarwar
    Ahmed, Abdallah Ahmed Alzupair
    Alattab, Ahmed Abdu
    Badr, Mohamed Mahdi
    Alwayle, Ibrahim M.
    [J]. HELIYON, 2023, 9 (11)
  • [2] Security Infrastructures: Towards the INDECT System Security
    Stoianov, Nikolai
    Uruena, Manuel
    Niemiec, Marcin
    Machnik, Petr
    Maestro, Gema
    [J]. MULTIMEDIA COMMUNICATIONS, SERVICES AND SECURITY, 2012, 287 : 304 - +
  • [3] A Step Towards Checking Security in IoT
    Bodei, Chiara
    Degano, Pierpaolo
    Ferrari, Gian-Luigi
    Galletta, Letterio
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2016, (223): : 128 - 142
  • [4] Enhancing SCADA System Security
    Fall, Moustapha
    Chuvalas, Chris
    Warning, Nolan
    Rabiee, Max
    Purdy, Carla
    [J]. 2020 IEEE 63RD INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2020, : 830 - 833
  • [5] Measuring Turkish System Security Using Thermal Security Index
    Cetinay, Hale
    Cebeci, M. Erkut
    [J]. 2013 8TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING (ELECO), 2013, : 210 - 214
  • [6] Enhancing power system security control
    DyLiacco, TE
    [J]. IEEE COMPUTER APPLICATIONS IN POWER, 1997, 10 (03): : 38 - 41
  • [7] Security Measuring System for IoT Devices
    Doynikova, Elena
    Novikova, Evgenia
    Murenin, Ivan
    Kolomeec, Maxim
    Gaifulina, Diana
    Tushkanova, Olga
    Levshun, Dmitry
    Meleshko, Alexey
    Kotenko, Igor
    [J]. COMPUTER SECURITY: ESORICS 2021 INTERNATIONAL WORKSHOPS, 2022, 13106 : 256 - 275
  • [8] Towards enhancing the security and accuracy of iris recognition systems
    Christian Rathgeb
    [J]. Datenschutz und Datensicherheit - DuD, 2013, 37 (6) : 367 - 370
  • [9] Legal Requirements towards Enhancing the Security of Medical Devices
    Yeng, Prosper K.
    Wulthusen, Stephen D.
    Yang, Bian
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (11) : 666 - 675
  • [10] Towards Enhancing the Security of OAuth Implementations In Smart Phones
    Shehab, Mohammed
    Mohsen, Fadi
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON MOBILE SERVICES (MS), 2014, : 39 - 46