Conceptual Systems Security Requirements Analysis: Aerial Refueling Case Study

被引:14
|
作者
Span, Martin, III [1 ]
Mailloux, Logan O. [2 ]
Mills, Robert F. [2 ]
Young, William, Jr. [3 ]
机构
[1] US Air Force Acad, Colorado Springs, CO 80841 USA
[2] Air Force Inst Technol, Wright Patterson AFB, OH 45433 USA
[3] 53rd Elect Warfare Grp, Eglin AFB, FL 32542 USA
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Cybersecurity; requirements engineering; security; security engineering; systems engineering; systems security engineering;
D O I
10.1109/ACCESS.2018.2865736
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's highly interconnected and technology-reliant environment, cybersecurity is no longer limited to traditional computer systems and IT networks, as a number of highly publicized attacks have occurred against complex cyber-physical systems such as automobiles and airplanes. While numerous vulnerability analysis and architecture analysis approaches are in use, these approaches are often focused on realized systems with limited solution space. A more effective approach for understanding security and resiliency requirements early in the system development is needed. One such approach, system-theoretic process analysis for security (STPA-Sec), addresses the cyber-physical security problem from a systems viewpoint at the conceptual stage when the solution trade-space is largest rather than merely examining components and adding protections during production, operation, or sustainment. This paper uniquely provides a detailed and independent evaluation of STPA-Sec's utility for eliciting, defining, and understanding security and resiliency requirements for a notional next generation aerial refueling platform.
引用
收藏
页码:46668 / 46682
页数:15
相关论文
共 50 条
  • [1] Argumentation-Based Security Requirements Analysis: BitMessage Case Study
    Kovacs, Andor
    Karakatsanis, Ioannis
    Svetinovic, Davor
    2014 IEEE INTERNATIONAL CONFERENCE (ITHINGS) - 2014 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) - 2014 IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL-SOCIAL COMPUTING (CPS), 2014, : 408 - 414
  • [2] Assessing Security Risk and Requirements for Systems of Systems
    Ki-Aries, Duncan
    2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 454 - 459
  • [3] Identifying Security Requirements Body of Knowledge for the Security Systems Engineer
    von Solms, Sune
    Marnewick, Annlize
    INFORMATION SECURITY EDUCATION: EDUCATION IN PROACTIVE INFORMATION SECURITY, WISE 12, 2019, 557 : 59 - 71
  • [4] Information Systems Strategy and Security Policy: A Conceptual Framework
    Kamariotou, Maria
    Kitsios, Fotis
    ELECTRONICS, 2023, 12 (02)
  • [5] A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos
    Pavlidis, Michalis
    Islam, Shareeful
    Mouratidis, Haralambos
    IS OLYMPICS: INFORMATION SYSTEMS IN A DIVERSE WORLD, 2012, 107 : 95 - 109
  • [6] Security Concept for Unoccupied Aerial Systems
    Perner, Cora
    Schmittt, Corinna
    2020 AIAA/IEEE 39TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC) PROCEEDINGS, 2020,
  • [7] A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems
    Span, Martin Trae
    Mailloux, Logan O.
    Grimaila, Michael R.
    Young, William Bill
    2018 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2018,
  • [8] Assessing System of Systems Security Risk and Requirements with OASoSIS
    Ki-Aries, Duncan
    Faily, Shamal
    Dogan, Huseyin
    Williams, Christopher
    2018 IEEE 5TH INTERNATIONAL WORKSHOP ON EVOLVING SECURITY & PRIVACY REQUIREMENTS ENGINEERING (ESPRE 2018), 2018, : 14 - 20
  • [9] Security requirements engineering: A framework for representation and analysis
    Haley, Charles B.
    Laney, Robin
    Moffett, Jonathan D.
    Nuseibeh, Bashar
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (01) : 133 - 153
  • [10] Using the AMAN-DA method to generate security requirements: a case study in the maritime domain
    Souag, Amina
    Mazo, Raul
    Salinesi, Camille
    Comyn-Wattiau, Isabelle
    REQUIREMENTS ENGINEERING, 2018, 23 (04) : 557 - 580