Utilizing security requirements engineering methods for operational security maintenance purposes

被引:0
|
作者
Abuosba, Khalil
El-Sheikh, Asim
Martin, Clemens
机构
来源
2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4 | 2008年
关键词
security; fault; event; trees; maintenance;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secure systems are achieved by implementing appropriate controls and policies specified based on appropriate selection of minimum security requirements. Maintaining security for these systems is a major challenge. Systems may encounter threats that may arise due to exploitation of vulnerabilities or due to programming flaws. In this work we address security requirements engineering approaches and focus primarily on methods that may be utilized for the purpose of investigating incidents. We have shown empirically that threats may be identified by using methods such as faults trees; and systematically that by using other methods such as events trees, incidents may be avoided or prevented.
引用
收藏
页码:1763 / 1767
页数:5
相关论文
共 50 条
  • [31] Security in operational wireless sensor networks
    Chang, Chih-Chun
    Muftic, Sead
    Nagel, David J.
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 781 - +
  • [32] Operational Support for Critical Infrastructure Security
    Hurst, William
    Merabti, Madjid
    Fergus, Paul
    2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1473 - 1478
  • [33] IoT Security Attacks Using Reverse Engineering Methods On WSN Applications
    Tellez, Mauricio
    El-Tawab, Samy
    Heydari, M. Hossain
    2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 182 - 187
  • [34] Balancing Security Requirements and Emotional Requirements in Video Games
    Callele, David
    Neufeld, Eric
    Schneider, Kevin
    PROCEEDINGS OF THE 16TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, 2008, : 319 - 320
  • [35] Cloud Security Engineering: Avoiding Security Threats the Right Way
    Aljawarneh, Shadi
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2011, 1 (02) : 64 - 70
  • [36] Security-Based Circuit Breaker Maintenance Management
    Dehghanian, Payman
    Kezunovic, Mladen
    Gurrala, Gurunath
    Guan, Yufan
    2013 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PES), 2013,
  • [37] Security Requirements for Proctoring in Higher Education
    Luijben, Robbie
    van den Broek, Fabian
    Alpar, Greg
    2024 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE, EDUCON 2024, 2024,
  • [38] Quantum Cryptography - The Analysis of Security Requirements
    Niemiec, Marcin
    ICTON: 2009 11TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOLS 1 AND 2, 2009, : 814 - 817
  • [39] Security requirements in software product lines
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 442 - +
  • [40] Eliciting security requirements by misuse cases
    Sindre, G
    Opdahl, AL
    37TH INTERNATIONAL CONFERENCE ON TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS, PROCEEDINGS, 2000, : 120 - 143