Spelling suggestions: "subject:"2security engineering"" "subject:"bsecurity engineering""
1 |
Resilient payment systemsBaqer, Khaled January 2018 (has links)
There have been decades of attempts to evolve or revolutionise the traditional financial system, but not all such efforts have been transformative or even successful. From Chaum's proposals in the 1980s for private payment systems to micropayments, previous attempts failed to take off for a variety of reasons, including non-existing markets, or issues pertaining to usability, scalability and performance, resilience against failure, and complexity of protocols. Towards creating more resilient payment systems, we investigated issues related to security engineering in general, and payment systems in particular. We identified that network coverage, central points of failure, and attacks may cripple system performance. The premise of our research is that offline capabilities are required to produce resilience in critical systems. We focus on issues related to network problems and attacks, system resilience, and scalability by introducing the ability to process payments offline without relying on the availability of network coverage; a lack of network coverage renders some payment services unusable for their customers. Decentralising payment verification, and outsourcing some operations to users, alleviates the burden of contacting centralised systems to process every transaction. Our secondary goal is to minimise the cost of providing payment systems, so providers can cut transaction fees. Moreover, by decentralising payment verification that can be performed offline, we increase system resilience, and seamlessly maintain offline operations until a system is back online. We also use tamper-resistant hardware to tackle usability issues, by minimising cognitive overhead and helping users to correctly handle critical data, minimising the risks of data theft and tampering. We apply our research towards extending financial inclusion efforts, since the issues discussed above must be solved to extend mobile payments to the poorest demographics. More research is needed to integrate online payments, offline payments, and delay-tolerant networking. This research extends and enhances not only payment systems, but other electronically-enabled services from pay-as-you-go solar panels to agricultural subsidies and payments from aid donors. We hope that this thesis is helpful for researchers, protocol designers, and policy makers interested in creating resilient payment systems by assisting them in financial inclusion efforts.
|
2 |
Warum wir ein Security-Engineering-Informationsmodell brauchen: Motivation, Anwendungsfälle und Konzept für ein neues Domänenmodell für Security-EngineeringTaştan, Emre, Fluchs, Sarah, Drath, Rainer 27 January 2022 (has links)
Security ist eine der größten Herausforderungen bei der industriellen Digitalisierung und der Einführung von Internettechnologien. Während die funktionale Sicherheit tief in die Entwicklung von Produkten oder Prozessen integriert ist, ist dies bei der Security nicht der Fall. Security-Engineering muss sich also – analog zur funktionalen Sicherheit – in den bestehenden und sich gerade stark verändernden Automation-Engineering-Prozess eingliedern, vor allem muss es aber für Automatisierungsingenieure effizient durchführbar sein. Dieser Beitrag begründet den Bedarf an einem Security-Engineering-Modell und berichtet über die laufenden Arbeiten zu den Anwendungsfällen und einem Modellierungsansatz mit AutomationML.
|
3 |
Simplifying development of secure software : Aspects and Agile methodsBoström, Gustav January 2006 (has links)
<p>Reducing the complexity of building secure software systems is an important goal as increased complexity can lead to more security flaws. This thesis aims at helping to reduce this complexity by investigating new programming techniques and software development methods for implementing secure software. We provide case studies on the use and effects of applying Aspect-oriented software development to Confidentiality, Access Control and Quality of Service implementation. We also investigate how eXtreme Programming can be used for simplifying the secure software development process by comparing it to the security engineering standards Common Criteria and the Systems Security Engineering Capability Maturity Model. We also explore the relationship between Aspect-oriented programming and Agile software development methods, such as eXtreme Programming.</p>
|
4 |
An Approach For Defensive Information Warfare In The Turkish Land Forces CommandOzcan, Fuzuli 01 January 2003 (has links) (PDF)
In this study, Information Warfare (IW) and Information System (IS) security concept in the Turkish Land Forces Command (TLFC) are investigated. An approach that will enhance the success for a secure Information System to alleviate experienced risks is proposed. Starting with the general overview of the literature about IW and IS security, the relation between the concepts, the future, advantages and disadvantages of security development approaches, and the requirements for security are reviewed. Then the specific problems, security risks and IW threats of the TLFC are considered. After reviewing the specific problems, a proposal for IS security in Defensive Information Warfare process in the TLFC is presented and partially applied. The proposal is evaluated within the framework of a case study. The stronger points of the proposal are reviewed by comparing the proposed approach with some other approaches actually applied.
|
5 |
Simplifying development of secure software : Aspects and Agile methodsBoström, Gustav January 2006 (has links)
Reducing the complexity of building secure software systems is an important goal as increased complexity can lead to more security flaws. This thesis aims at helping to reduce this complexity by investigating new programming techniques and software development methods for implementing secure software. We provide case studies on the use and effects of applying Aspect-oriented software development to Confidentiality, Access Control and Quality of Service implementation. We also investigate how eXtreme Programming can be used for simplifying the secure software development process by comparing it to the security engineering standards Common Criteria and the Systems Security Engineering Capability Maturity Model. We also explore the relationship between Aspect-oriented programming and Agile software development methods, such as eXtreme Programming. / QC 20101130
|
6 |
Constructing a Cyber Preparedness Framework (CPF): The Lockheed Martin Case StudyBeyer, Dawn Marie 01 January 2014 (has links)
The protection of sensitive data and technologies is critical in preserving United States (U.S.) national security and minimizing economic losses. However, during a cyber attack, the operational capability to constrain the exfiltrations of sensitive data and technologies may not be available. A cyber preparedness methodology (CPM) can improve operational capability and cyber security. The CPM enables a corporation to (a) characterize cyber threats; (b) determine the level of preparedness necessary to ensure mission success; (c) facilitate strategic planning for cyber security (CS); and (d) establish priorities for CS investment planning and management decisions. The cyber preparedness framework (CPF) underlies the CPM. A corporation's leadership articulates its fundamental approach to risk management (RM) and mission assurance, and determines its target level of preparedness. Typically, corporations utilize the CPF to (a) characterize the caliber of the threat; (b) assess the technical and operational capabilities to counter the threat; and (c) develop the governance and processes necessary to achieve its cyber preparedness level.
The problem that was investigated in this case study was how to construct a CPF for Lockheed Martin (LM) that works in conjunction with a risk management process (RMP). The goal was to extend the CPF into an RMP to construct a risk management framework (RMF) paradigm that can aid similarly large-sized private sector U.S. Government (USG) contractors in implementing the CPM. In this investigation, the author identified the corporate (a) security categorization, (b) cyber threats, (c) cyber threat level, (d) cyber preparedness level, (e) capabilities the corporation should utilize to counter cyber threats, and (f) governance and processes necessary to achieve the cyber preparedness level for a large-sized private sector USG contractor. The results of this investigation were organized in terms of RMP phases. Based on the results, the author constructed an RMF paradigm that can aid similarly large-sized USG contractors in implementing a CPM.
|
7 |
DIAGNÓSTICO SOBRE O TEMA ACÚSTICA NOS CURSOS DE ENGENHARIA DE SEGURANÇA DO TRABALHO NA REGIÃO SUL DO BRASIL / DIAGNOSIS ON ACOUSTICS THEME IN COURSES OF SAFETY ENGINEERING IN SOUTHERN BRAZILFreitas, Lúcio Flávio Gross 09 March 2012 (has links)
The present study evaluated the technical knowledge level of the Job Security
Engineering professionals about the noise and its influences in the workers, through
a investigation of the normative, the lato sensu specialization courses curricular
structure in the Job Security Engineering in the South region of Brazil (in the states of
Rio Grande do Sul, Santa Catarina and Parana), and the technical knowledge of
these professionals. For both, it was proceeded an exploratory and explanatory with
a quantitative approach, that allowed the technical knowledge about the Job Security
Engineering course, measuring its comprisement and professional performance. The
work also allowed the evaluation of the index of technical knowledge of these
professionals about the noise and its influences in the workers population. The
mainly results of this research showed that nowadays the specialization courses lato
sensu in the Job Security Engineering approach the subjects about the noise and its
influences in the people in a discipline module that varies from 15 to 50h according to
the School. This workload variation can be one of the explanations of the Job
Security Engineers low technological Knowledge level, showed in the research. Still
in analysis, the technical knowledge of these professionals it was possible to find the
opposite of what is expected from these professionals acquire much more technical
knowledge arouse the subject in the professional career than in the classroom, what
allows to conclude that nowadays in case of the subjects about the noise and its
influence about the people, the courses in the South of Brazil have a much more
informative than formative role. In the role of changing this scene, this work
suggested a minimum workload of 80 hours and a clear division of the subjects. / O presente estudo avaliou o nível de conhecimento técnico de profissionais de
Engenharia de Segurança do Trabalho acerca do ruído e de sua influência nos
trabalhadores, através de uma investigação das normativas, da estrutura curricular
dos cursos de especialização lato sensu em Engenharia de Segurança do Trabalho
da região Sul do Brasil (estados do Rio Grande do Sul, Santa Catarina e Paraná), e
do conhecimento técnico destes profissionais. Para tanto, procedeu-se uma
pesquisa exploratória e explicativa com abordagem quantitativa, que possibilitou o
conhecimento sobre o curso de Engenharia de Segurança do Trabalho, mensurando
sua abrangência e atuação profissional. O trabalho também permitiu a avaliação do
índice de conhecimento técnico destes profissionais sobre o ruído e sua influência
na população de trabalhadores. Os principais resultados desta pesquisa mostram
que atualmente os cursos de especialização lato sensu em Engenharia de
Segurança do Trabalho abordam os conteúdos sobre o ruído e sua influência nas
pessoas em um módulo de uma disciplina que varia de 15 a 50h conforme a
instituição de ensino. Esta variação de carga-horária pode ser uma das explicações
do baixo índice de conhecimento técnico dos Engenheiros de Segurança do
Trabalho, apresentados na pesquisa. Ainda em análise do nível de conhecimento
técnico destes profissionais foi possível constatar que ao contrario do que se espera
estes profissionais adquirem muito mais conhecimento técnico acerca do assunto na
carreira profissional do que em sala de aula, o que permite concluir que atualmente
em se tratando de conteúdos sobre o ruído e sua influência sobre as pessoas, os
cursos do sul do Brasil possuem um caráter muito mais informativo do que formativo.
No intuito de mudar este panorama o trabalho sugeriu uma carga horária mínima de
80 horas e uma clara divisão de conteúdos.
|
8 |
Identification and Evaluation of Security Activities in Agile Projects : A Systematic Literature Review and Survey StudyAyalew, Tigist, Kidane, Tigist January 2012 (has links)
Context: Today’s software development industry requires high-speed software delivery from the development team. In order to do this, organizations make transformation from their conventional software development method to agile development method while preserving customer satisfaction. Even though this approach is becoming popular development method, from security point of view, it has some disadvantage. Because, this method has several constraints imposed such as lack of a complete overview of a product, higher development pace and lack of documentation. Although security-engineering (SE) process is necessary in order to build secure software, no SE process is developed specifically for agile model. As a result, SE processes that are commonly used in waterfall model are being used in agile models. However, there is a clash or disparity between the established waterfall SE processes and the ideas and methodologies proposed by the agile manifesto. This means that, while agile models work with short development increments that adapt easily to change, the existing SE processes work in plan-driven development setting and try to reduce defects found in a program before the occurrence of threats through heavy and inflexible process. This study aims at bridging the gap in agile model and security by providing insightful understanding of the SE process that are used in the current agile industry. Objectives: The objectives of this thesis are to identify and evaluate security activities from high-profile waterfall SE-process that are used in the current agile industry. Then, to suggest the most compatible and beneficial security activities to agile model based on the study results. Methods: The study involved two approaches: systematic literature review and survey. The systematic literature review has two main aims. The first aim is to gain a comprehensive understanding of security in an agile process model; the second one is to identify high-profile SE processes that are commonly used in waterfall model. Moreover, it helped to compare the thesis result with other previously done works on the area. A survey is conducted to identify and evaluate waterfall security activities that are used in the current agile industry projects. The evaluation criteria were based on the security activity integration cost and benefit provides to agile projects. Results: The results of the systematic review are organized in a tabular form for clear understanding and easy analysis. High-profile SE processes and their activities are obtained. These results are used as an input for the survey study. From the survey study, security activities that are used in the current agile industry are identified. Furthermore, the identified security activities are evaluated in terms of benefit and cost. As a result the best security activities, that are compatible and beneficial, are investigated to agile process model. Conclusions: To develop secure software in agile model, there is a need of SE-process or practice that can address security issues in every phase of the agile project lifecycle. This can be done either by integrating the most compatible and beneficial security activities from waterfall SE processes with agile process or by creating new SE-process. In this thesis, it has been found that, from the investigated high-profile waterfall SE processes, none of the SE processes was fully compatible and beneficial to agile projects. / (046) 73 6136215
|
9 |
Formal Analysis and Design for Engineering SecurityMansour, Riham 20 April 2009 (has links)
Engineering secure software remains a significant challenge for today's software organizations as they struggle to understand the implications of security on their systems and develop systems that guarantee specified software security properties. The use of formal methods that are based on mathematical models has long been advocated in the development of secure systems, yet the promise of formal methods has not been realized. This is due to the additional discipline needed to formulate precisely the requirements and due complexities that often confront engineers. Further, the cost of development and the requisite learning curve of formal methods are quite high making them cost prohibitive to apply, especially for large software.
The transition from requirements to design has been one of the most difficult steps in software development. Moreover, effective methods for deriving design from requirements that guarantee retention of the intended security properties remain largely unrealized on a repeatable and consistent basis. If security requirements are formalized and transformed into design using formal methods, the potential for security vulnerabilities would be diminished through better clarity, completeness, and consistency. Therefore, a requirements specification must be systematically transformable to a formal representation, and through effective formal methods the design can be derived such that the security properties are preserved and conveyed.
This dissertation presents the FADES (Formal Analysis and Design for Engineering Security) approach that couples goal-oriented requirements specification with formal design specification to develop secure software in a constructive, provable and cost-effective way. To the best of our knowledge, FADES is the first security engineering approach that provides a systematic and automated bridge between semi-formal security requirements and formal design and implementation. FADES maintains the completeness and consistency of the security requirements specified with KAOS (Knowledge Acquisition for autOmated Specifications) when transformed to B formal specifications. Relaxing formality during requirements analysis enables security requirements to be better organized for producing more complete, consistent and clear requirements. The KAOS requirements model is then transformed to B, a popular formal representation used to derive and refine software systems. Security design specifications and implementation are produced using the B formal method which preserves the requisite security requirement properties.
FADES treats security-specific elements in a systematic and constructive way while considering security early in the development lifecycle. Moreover, employing FADES provides better confidence for security evaluators in the evaluation of trusted software. A side effect of employing formal methods in development is the availability of sufficient traceability information at the various phases of development and maintenance allowing for more accurate impact analysis of security changes.
FADES has been examined empirically both by security engineering experts and practitioners. Results obtained from the controlled experiments compare FADES to other formal methods, and show that FADES preserves security properties while maintaining better consistency, quality, and completeness. This is accomplished at a lower cost and with better results. These results have been evaluated by academic and industry experts working in the area of security and formal methods. / Ph. D.
|
10 |
Model-based Evaluation: from Dependability Theory to SecurityAlaboodi, Saad Saleh 21 June 2013 (has links)
How to quantify security is a classic question in the security community that until today has had no plausible answer. Unfortunately, current security evaluation models are often either quantitative but too specific (i.e., applicability is limited), or comprehensive (i.e., system-level) but qualitative. The importance of quantifying security cannot be overstated, but doing so is difficult and complex, for many reason: the “physics” of the amount of security is ambiguous; the operational state is defined by two confronting parties; protecting and breaking systems is a cross-disciplinary mechanism; security is achieved by comparable security strength and breakable by the weakest link; and the human factor is unavoidable, among others. Thus, security engineers face great challenges in defending the principles of information security and privacy. This thesis addresses model-based system-level security quantification and argues that properly addressing the quantification problem of security first requires a paradigm shift in security modeling, addressing the problem at the abstraction level of what defines a computing system and failure model, before any system-level analysis can be established. Consequently, we present a candidate computing systems abstraction and failure model, then propose two failure-centric model-based quantification approaches, each including a bounding system model, performance measures, and evaluation techniques. The first approach addresses the problem considering the set of controls. To bound and build the logical network of a security system, we extend our original work on the Information Security Maturity Model (ISMM) with Reliability Block Diagrams (RBDs), state vectors, and structure functions from reliability engineering. We then present two different groups of evaluation methods. The first mainly addresses binary systems, by extending minimal path sets, minimal cut sets, and reliability analysis based on both random events and random variables. The second group addresses multi-state security systems with multiple performance measures, by extending Multi-state Systems (MSSs) representation and the Universal Generating Function (UGF) method. The second approach addresses the quantification problem when the two sets of a computing system, i.e., assets and controls, are considered. We adopt a graph-theoretic approach using Bayesian Networks (BNs) to build an asset-control graph as the candidate bounding system model, then demonstrate its application in a novel risk assessment method with various diagnosis and prediction inferences. This work, however, is multidisciplinary, involving foundations from many fields, including security engineering; maturity models; dependability theory, particularly reliability engineering; graph theory, particularly BNs; and probability and stochastic models.
|
Page generated in 0.0789 seconds