Evaluation of Visual Notations as a Basis for ICS Security Design Decisions

被引:4
|
作者
Fluchs, Sarah [1 ]
Drath, Rainer [2 ]
Fay, Alexander [3 ]
机构
[1] Admeritia GmbH, D-40764 Langenfeld, Germany
[2] Pforzheim Univ, Sch Engn, D-75175 Pforzheim, Germany
[3] Helmut Schmidt Univ, Dept Automat, D-22043 Hamburg, Germany
关键词
Security; Decision making; Visualization; Integrated circuits; Automation; Monitoring; Knowledge engineering; Industrial control; Automation engineering; industrial control system security; security by design; visual language; REQUIREMENTS; TOOL;
D O I
10.1109/ACCESS.2023.3238326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For making informed security decisions during the design of industrial control systems (ICS), engineers need to process large amounts of security-relevant information outside their area of expertise. This problem moves the presentation of the security-relevant information into focus: security-relevant engineering information must be presented to security decision-makers in a way that enables them to decide upon security measures to build a defensible system. Visual representations have the potential to effectively convey suchlike information, thus saving the engineers' brain capacity for the security decision-making. However, research shows that this potential is only realized if the visualizations are carefully constructed for cognitive effectiveness. As a prerequisite for constructing a visual language for security engineering in the future, this paper explores two scientific questions: 1) what are the requirements for visualizing security-relevant engineering information in a way that enables engineers to make security decisions during ICS design? and 2) which existing visual languages meet (parts of) these requirements? The evaluation of existing visualizations reveals that there is a need for an improved, specialized visual language for security engineering that builds upon established engineering visualizations like piping and instrumentation diagrams and network maps, represents all security-relevant information as icons to achieve semantic transparency, and includes filtering mechanisms to reduce the complexity of each single diagram. The paper finishes with defining the main pillars of a future visual language that should allow ICS engineers to quickly capture security-relevant information and guide them through the process of selecting the right security measures to design a defensible ICS.
引用
收藏
页码:9967 / 9994
页数:28
相关论文
共 28 条
  • [1] The "Physics" of Notations: Toward a Scientific Basis for Constructing Visual Notations in Software Engineering
    Moody, Daniel L.
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2009, 35 (06) : 756 - 779
  • [2] Role of Gender in the Evaluation of Security Decisions
    Mbaka, Winnie
    Tuma, Katja
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 38 - 48
  • [3] Traceable security by design decisions for automation systems through function-based diagrams and security libraries
    Fluchs, Sarah
    Tastan, Emre
    Trumpf, Tobias
    Horch, Alexander
    Drath, Rainer
    Fay, Alexander
    AT-AUTOMATISIERUNGSTECHNIK, 2023, 71 (09) : 759 - 778
  • [4] FINANCIAL PROVISIONING - BASIS OF STRATEGIC DECISIONS OF THEMANAGEMENT OF RESOURCES FOR SECURITY AND DEFENCE
    Dimitrova, Sevdalina
    Terziev, Venelin
    21ST INTERNATIONAL CONFERENCE THE KNOWLEDGE-BASED ORGANIZATION, 2015, 21 : 294 - 299
  • [5] Security by design for Industry 4.0 Tracing design decisions model-based
    Kern, Matthias
    Glock, Thomas
    Betancourt, Victor Pazmino
    Liu, Bo
    Becker, Juergen
    Sax, Eric
    ATP MAGAZINE, 2020, (08): : 56 - 63
  • [6] Convolutional Neural Network for Visual Security Evaluation
    Yang, Ying
    Xiang, Tao
    Liu, Hangcheng
    Liao, Xiaofeng
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (08) : 3293 - 3307
  • [7] Traceable Security-by-Design Decisions for Cyber-Physical Systems (CPSs) by Means of Function-Based Diagrams and Security Libraries
    Fluchs, Sarah
    Tastan, Emre
    Trumpf, Tobias
    Horch, Alexander
    Drath, Rainer
    Fay, Alexander
    SENSORS, 2023, 23 (12)
  • [8] Exploring Data Distributions: Visual Design and Evaluation
    Sopan, Awalin
    Freier, Manuel
    Taieb-Maimon, Meirav
    Plaisant, Catherine
    Golbeck, Jennifer
    Shneiderman, Ben
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2013, 29 (02) : 77 - 95
  • [9] Design and Evaluation of a Lightweight Security Framework for IoT Applications
    Satamraju, Krishna Prasad
    Malarkodi, B.
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 522 - 526
  • [10] The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User
    Carroll, Fiona
    Legg, Phil
    Bonkel, Bastian
    2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020), 2020,