A grounded analysis of experts' decision-making during security assessments

被引:6
作者
Hibshi, Hanan [1 ]
Breaux, Travis D. [1 ]
Riaz, Maria [2 ]
Williams, Laurie [2 ]
机构
[1] Carnegie Mellon Univ, Inst Software Res, Pittsburgh, PA 15213 USA
[2] North Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
来源
JOURNAL OF CYBERSECURITY | 2016年 / 2卷 / 02期
关键词
security; requirements; patterns; analysis; decision-making; ysituation awareness;
D O I
10.1093/cybsec/tyw010
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Security analysis requires specialized knowledge to align threats and vulnerabilities in information technology. To identify mitigations, analysts need to understand how threats, vulnerabilities, and mitigations are composed together to yield security requirements. Despite abundant guidance in the form of checklists and controls about how to secure systems, evidence suggests that security experts do not apply these checklists. Instead, they rely on their prior knowledge and experience to identify security vulnerabilities. To better understand the different effects of checklists, design analysis, and expertise, we conducted a series of interviews to capture and encode the decision-making process of security experts and novices during three security analysis exercises. Participants were asked to analyze three kinds of artifacts: source code, data flow diagrams, and network diagrams, for vulnerabilities, and then to apply a requirements checklist to demonstrate their ability to mitigate vulnerabilities. We framed our study using Situation Awareness, which is a theory about human perception that was used to elicit interviewee responses. The responses were then analyzed using coding theory and grounded analysis. Our results include decision-making patterns that characterize how analysts perceive, comprehend, and project future threats against a system, and how these patterns relate to selecting security mitigations. Based on this analysis, we discovered new theory to measure how security experts and novices apply attack models and how structured and unstructured analysis enables increasing security requirements coverage. We highlight the role of expertise level and requirements composition in affecting security decision-making and we discuss how our method produced new hypotheses about security analysis and decision-making.
引用
收藏
页码:147 / 163
页数:17
相关论文
共 49 条
[1]   COGNITIVE STYLES AND MULTICULTURAL POPULATIONS [J].
ANDERSON, JA .
JOURNAL OF TEACHER EDUCATION, 1988, 39 (01) :2-9
[2]  
Anderson JR, 2000, LEARNING MEMORY
[3]  
[Anonymous], 2015, NIST ITL SPECIAL PUB, V800
[4]  
Arasu A., 2008, SIGMOD, P1231
[5]   The cultural mind: Environmental decision making and cultural Modeling within and across Populations [J].
Atran, S ;
Medin, DL ;
Ross, NO .
PSYCHOLOGICAL REVIEW, 2005, 112 (04) :744-776
[6]  
Beresnevichiene Y., 2010, NOMS 2010 - 2010 IEEE/IFIP Network Operations and Management Symposium Workshops, P118, DOI 10.1109/NOMSW.2010.5486590
[7]   Legally "reasonable" security requirements: A 10-year FTC retrospective [J].
Breaux, Travis D. ;
Baumer, David L. .
COMPUTERS & SECURITY, 2011, 30 (04) :178-193
[8]  
Burt C, 1933, BRIT J EDUC PSYCHOL, V3, P187
[9]   Causal attribution across cultures: Variation and universality [J].
Choi, I ;
Nisbett, RE ;
Norenzayan, A .
PSYCHOLOGICAL BULLETIN, 1999, 125 (01) :47-63
[10]  
Chung L., 1993, Advanced Information Systems Engineering 5th International Conference. CAiSE '93 Proceedings, P234