The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game

被引:37
作者
Frey, Sylvain [1 ]
Rashid, Awais [2 ]
Anthonysamy, Pauline [3 ]
Pinto-Albuquerque, Maria [4 ]
Naqvi, Syed Asad [5 ]
机构
[1] Univ Southampton, Southampton SO17 1BJ, Hants, England
[2] Univ Bristol, Bristol BS8 1TH, Avon, England
[3] Google, CH-8002 Zurich, Switzerland
[4] IUL, ISCTE, P-1649026 Lisbon, Portugal
[5] Univ Lancaster, Lancaster LA1 4YW, England
基金
英国工程与自然科学研究理事会;
关键词
Security decisions; security requirements; game; decision patterns; INFORMATION SECURITY;
D O I
10.1109/TSE.2017.2782813
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Stakeholders' security decisions play a fundamental role in determining security requirements, yet, little is currently understood about how different stakeholder groups within an organisation approach security and the drivers and tacit biases underpinning their decisions. We studied and contrasted the security decisions of three demographics-security experts, computer scientists and managers-when playing a tabletop game that we designed and developed. The game tasks players with managing the security of a cyber-physical environment while facing various threats. Analysis of 12 groups of players (4 groups in each of our demographics) reveals strategies that repeat in particular demographics, e.g., managers and security experts generally favoring technological solutions over personnel training, which computer scientists preferred. Surprisingly, security experts were not ipso facto better players-in some cases, they made very questionable decisions-yet they showed a higher level of confidence in themselves. We classified players' decision-making processes, i.e., procedure-, experience-, scenario-or intuition-driven. We identified decision patterns, both good practices and typical errors and pitfalls. Our game provides a requirements sandbox in which players can experiment with security risks, learn about decision-making and its consequences, and reflect on their own perception of security.
引用
收藏
页码:521 / 536
页数:16
相关论文
共 28 条
  • [1] Anderson A., 2006, EDUCAUSE Q, P15
  • [2] Antrobus R., 2016, P 4 INT S ICS SCADA, P1
  • [3] Is information security under control? Investigating quality in information security management
    Baker, Wade H.
    Wallace, Linda
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (01) : 36 - 44
  • [4] A Serious Game for Eliciting Social Engineering Security Requirements
    Beckers, Kristian
    Pape, Sebastian
    [J]. 2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 16 - 25
  • [5] Information security and risk management
    Bodin, Lawrence D.
    Gordon, Lawrence A.
    Loeb, Martin P.
    [J]. COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68
  • [6] A model for evaluating IT security investments
    Cavusoglu, H
    Mishra, B
    Raghunathan, S
    [J]. COMMUNICATIONS OF THE ACM, 2004, 47 (07) : 87 - 92
  • [7] Coles-Kemp L, 2007, J COMPUT VIROL HACKI, V3, P143, DOI 10.1007/s11416-007-0040-6
  • [8] Corriss L, 2010, P 2010 WORKSH GOV TE, P35, DOI 10.1145/1920320.1920326
  • [9] Denning T., 2013, P ACM C COMP COMM SE, DOI [10.1145/2508859.2516753, DOI 10.1145/2508859.2516753]
  • [10] VIDEO GAMES AS RESEARCH TOOLS - THE SPACE FORTRESS GAME
    DONCHIN, E
    [J]. BEHAVIOR RESEARCH METHODS INSTRUMENTS & COMPUTERS, 1995, 27 (02): : 217 - 223