Utilizing security requirements engineering methods for operational security maintenance purposes

被引:0
|
作者
Abuosba, Khalil
El-Sheikh, Asim
Martin, Clemens
机构
来源
2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4 | 2008年
关键词
security; fault; event; trees; maintenance;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secure systems are achieved by implementing appropriate controls and policies specified based on appropriate selection of minimum security requirements. Maintaining security for these systems is a major challenge. Systems may encounter threats that may arise due to exploitation of vulnerabilities or due to programming flaws. In this work we address security requirements engineering approaches and focus primarily on methods that may be utilized for the purpose of investigating incidents. We have shown empirically that threats may be identified by using methods such as faults trees; and systematically that by using other methods such as events trees, incidents may be avoided or prevented.
引用
收藏
页码:1763 / 1767
页数:5
相关论文
共 50 条
  • [41] Security and Reliability Requirements for a Virtual Classroom
    Rehman, Shafiq Ur
    Khan, Muhammad Umair
    11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 : 447 - 452
  • [42] Towards a security engineering process
    Artelsmair, C
    Wagner, R
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS: I, 2003, : 22 - 27
  • [43] LOGIC ENGINEERING WITH APPLICATIONS TO SECURITY
    Masalagiu, Cristian-Dumitru
    Alaib, Vasile
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (02): : 141 - 148
  • [44] E-Commerce Security based on a security engineering life cycle
    Wu, Yanyan
    ACHIEVEMENTS IN ENGINEERING MATERIALS, ENERGY, MANAGEMENT AND CONTROL BASED ON INFORMATION TECHNOLOGY, PTS 1 AND 2, 2011, 171-172 : 640 - 643
  • [45] LiDAR RTK Unmanned Aerial Vehicles for security purposes
    Baiocchi, Valerio
    Fortunato, Sabina
    Giannone, Francesca
    Marzaioli, Valerio
    Monti, Felicia
    Onori, Roberta
    Ruzzi, Lorenzo
    Vatore, Felicia
    GEOGRAPHIA TECHNICA, 2024, 19 (01): : 34 - 42
  • [46] STRATEGIC, TACTICAL, & OPERATIONAL MANAGEMENT SECURITY MODEL
    White, Garry
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2009, 49 (03) : 71 - 75
  • [47] SCANNING OF ELECTROMAGNETIC RADIATION FOR EMC AND DATA SECURITY PURPOSES
    Kresalek, Vojtech
    Smola, Michal
    Kosina, Tomas
    42ND ANNUAL 2008 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 117 - 120
  • [48] Sound methods and effective tools for model-based security engineering with UML
    Jürjens, J
    ICSE 05: 27TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2005, : 322 - 331
  • [49] Governance-Focused Classification of Security and Privacy Requirements from Obligations in Software Engineering Contracts
    Anish, Preethu Rose
    Verma, Aparna
    Venkatesan, Sivanthy
    Logamurugan, V
    Ghaisas, Smita
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2024, 2024, 14588 : 92 - 108
  • [50] Security Requirements Engineering (SRE) Framework for Cyber-Physical Systems (CPS): SRE for CPS
    ur Rehman, Shafiq
    Gruhn, Volker
    NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2017, 297 : 153 - 163