A grounded analysis of experts' decision-making during security assessments

被引:6
作者
Hibshi, Hanan [1 ]
Breaux, Travis D. [1 ]
Riaz, Maria [2 ]
Williams, Laurie [2 ]
机构
[1] Carnegie Mellon Univ, Inst Software Res, Pittsburgh, PA 15213 USA
[2] North Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
来源
JOURNAL OF CYBERSECURITY | 2016年 / 2卷 / 02期
关键词
security; requirements; patterns; analysis; decision-making; ysituation awareness;
D O I
10.1093/cybsec/tyw010
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Security analysis requires specialized knowledge to align threats and vulnerabilities in information technology. To identify mitigations, analysts need to understand how threats, vulnerabilities, and mitigations are composed together to yield security requirements. Despite abundant guidance in the form of checklists and controls about how to secure systems, evidence suggests that security experts do not apply these checklists. Instead, they rely on their prior knowledge and experience to identify security vulnerabilities. To better understand the different effects of checklists, design analysis, and expertise, we conducted a series of interviews to capture and encode the decision-making process of security experts and novices during three security analysis exercises. Participants were asked to analyze three kinds of artifacts: source code, data flow diagrams, and network diagrams, for vulnerabilities, and then to apply a requirements checklist to demonstrate their ability to mitigate vulnerabilities. We framed our study using Situation Awareness, which is a theory about human perception that was used to elicit interviewee responses. The responses were then analyzed using coding theory and grounded analysis. Our results include decision-making patterns that characterize how analysts perceive, comprehend, and project future threats against a system, and how these patterns relate to selecting security mitigations. Based on this analysis, we discovered new theory to measure how security experts and novices apply attack models and how structured and unstructured analysis enables increasing security requirements coverage. We highlight the role of expertise level and requirements composition in affecting security decision-making and we discuss how our method produced new hypotheses about security analysis and decision-making.
引用
收藏
页码:147 / 163
页数:17
相关论文
共 49 条
[41]  
Rao A. S., 2014, PROC ASEE ANN C EXPO, P1
[42]  
Rittel H. W., 1974, MAN MADE FUTURES, V26, P272
[43]  
Saladana J., 2012, CODING MANUAL QUALIT
[44]  
SANS, 2014, SANS 20 CRIT SEC CON
[45]  
Schaefer K. E., 2012, 2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA 2012), P138, DOI 10.1109/CogSIMA.2012.6188366
[46]  
Sindre G, 2011, NORSK INFORMATIKKONF
[47]  
van Lamsweerde A, 2004, LECT NOTES COMPUT SC, V2941, P325
[48]   Trust (and mistrust) in secure applications [J].
Viega, J ;
Kohno, T ;
Potter, B .
COMMUNICATIONS OF THE ACM, 2001, 44 (02) :31-36
[49]  
Yin Robert K, 2009, CASE STUDY RES DESIG