Conceptual Systems Security Requirements Analysis: Aerial Refueling Case Study

被引:14
|
作者
Span, Martin, III [1 ]
Mailloux, Logan O. [2 ]
Mills, Robert F. [2 ]
Young, William, Jr. [3 ]
机构
[1] US Air Force Acad, Colorado Springs, CO 80841 USA
[2] Air Force Inst Technol, Wright Patterson AFB, OH 45433 USA
[3] 53rd Elect Warfare Grp, Eglin AFB, FL 32542 USA
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Cybersecurity; requirements engineering; security; security engineering; systems engineering; systems security engineering;
D O I
10.1109/ACCESS.2018.2865736
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's highly interconnected and technology-reliant environment, cybersecurity is no longer limited to traditional computer systems and IT networks, as a number of highly publicized attacks have occurred against complex cyber-physical systems such as automobiles and airplanes. While numerous vulnerability analysis and architecture analysis approaches are in use, these approaches are often focused on realized systems with limited solution space. A more effective approach for understanding security and resiliency requirements early in the system development is needed. One such approach, system-theoretic process analysis for security (STPA-Sec), addresses the cyber-physical security problem from a systems viewpoint at the conceptual stage when the solution trade-space is largest rather than merely examining components and adding protections during production, operation, or sustainment. This paper uniquely provides a detailed and independent evaluation of STPA-Sec's utility for eliciting, defining, and understanding security and resiliency requirements for a notional next generation aerial refueling platform.
引用
收藏
页码:46668 / 46682
页数:15
相关论文
共 50 条
  • [21] Tracing security requirements in industrial control systems using graph databases
    Tanveer, Awais
    Sharma, Chandan
    Sinha, Roopak
    Kuo, Matthew M. Y.
    SOFTWARE AND SYSTEMS MODELING, 2023, 22 (03) : 851 - 870
  • [22] Tracing security requirements in industrial control systems using graph databases
    Awais Tanveer
    Chandan Sharma
    Roopak Sinha
    Matthew M. Y. Kuo
    Software and Systems Modeling, 2023, 22 : 851 - 870
  • [23] Requirements reuse for improving information systems security: A practitioner's approach
    Toval A.
    Nicolás J.
    Moros B.
    García F.
    Requirements Engineering, 2002, 6 (4) : 205 - 219
  • [24] Electronic voting systems security requirements engineering
    Daimi, K
    Wilson, C
    SERP '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2005, : 230 - 235
  • [25] Complying with Security Requirements in Cloud Storage Systems
    Roman, Rodrigo
    Felipe, Miguel Rodel
    Gene, Phua Eu
    Zhou, Jianying
    JOURNAL OF COMPUTERS, 2016, 11 (03) : 201 - 206
  • [26] A Case Study of Introducing Security Risk Assessment in Requirements Engineering in a Large Organization
    Ardi S.
    Sandahl K.
    Gustafsson M.
    SN Computer Science, 4 (5)
  • [27] Requirements specification of a Cloud Service for Cyber Security Compliance Analysis
    Furfaro, Angelo
    Gallo, Teresa
    Garro, Alfredo
    Sacca, Domenico
    Tundis, Andrea
    2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 205 - 212
  • [28] Quantum Cryptography - The Analysis of Security Requirements
    Niemiec, Marcin
    ICTON: 2009 11TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOLS 1 AND 2, 2009, : 814 - 817
  • [29] Security requirements elicitation: a smart health case
    Rabii, Anass
    Assoul, Saliha
    Roudies, Ounsa
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 776 - 781
  • [30] Security measurement of instrumentation systems: A case study of NPP
    Singh, Pooja
    Singh, Lalit Kumar
    PROGRESS IN NUCLEAR ENERGY, 2023, 165