Rational Choice of Security Measures Via Multi-parameter Attack Trees

Author(s):  
Ahto Buldas ◽  
Peeter Laud ◽  
Jaan Priisalu ◽  
Märt Saarepera ◽  
Jan Willemson
2014 ◽  
pp. 2099-2119
Author(s):  
Punam Bedi ◽  
Vandana Gandotra ◽  
Archana Singhal

This chapter discusses adoption of some proactive strategies in threat management for security of software systems. Security requirements play an important role for secure software systems which arise due to threats to the assets from malicious users. It is therefore imperative to develop realistic and meaningful security requirements. A hybrid technique has been presented in this chapter evolved by overlapping the strengths of misuse cases and attack trees for elicitation of flawless security requirements. This chapter also discusses an innovative technique using fuzzy logic as a proactive step to break the jinx of brittleness of present day security measures based on binary principle. In this mechanism, partially secure state evolved between safe state and failed state using fuzzy logic provides an alert signal to take appropriate additional preventive measures to save the system from entering into the failed state to the extent possible.


Author(s):  
Juliet U. Elu ◽  
Gregory N. Price

This chapter provides an overview and recapitulation on the causes and consequences of terrorism in sub-Saharan Africa (SSA). While terrorism is a global phenomenon, counterterrorism policy could constitute a challenge in SSA. As an economic good, terrorism can be explained within a standard rational choice model of optimizing agents, or an existential good explained by individuals who are present-aim oriented. Such a consideration is important for enabling security measures that are likely to be effective against terrorism in SSA. As many countries in SSA are in a geography subject to climate change, the chapter also considers the extent to which climate change can enable terrorism in SSA.


2020 ◽  
Author(s):  
Dong-won Kim ◽  
Jin-young Choi ◽  
Keun-hee Han

Abstract Background: In this study, the effects of cybersecurity threats on telemedicine were investigated, and methods to evaluate security risks were considered. Many research institutes and investigation agencies have provided information about cybersecurity incidents in the medical field, between 2009 and 2019. Methods: The scenario information about cybersecurity threats was directly collected through a field survey. Potential threats that can occur in telemedicine services were accurately identified, and objective security requirements were derived by threat modeling using attack trees. The attack occurrence probability and attack success probability according to the importance of telemedicine service assets were included as variables. Results: The introduction of telemedicine guarantees accessibility to medical services for vulnerable areas. However, potential security threats and response measures in the telemedicine environment, which includes users and patients, remote medical devices, home networks, gateway devices, the Internet, and the telemedicine system, have not been considered thus far. Conclusion: This study contributes to the improvement of security by introducing methods to identify and evaluate security threats and preparing security measures for the telemedicine environment.


Author(s):  
Punam Bedi ◽  
Vandana Gandotra ◽  
Archana Singhal

This chapter discusses adoption of some proactive strategies in threat management for security of software systems. Security requirements play an important role for secure software systems which arise due to threats to the assets from malicious users. It is therefore imperative to develop realistic and meaningful security requirements. A hybrid technique has been presented in this chapter evolved by overlapping the strengths of misuse cases and attack trees for elicitation of flawless security requirements. This chapter also discusses an innovative technique using fuzzy logic as a proactive step to break the jinx of brittleness of present day security measures based on binary principle. In this mechanism, partially secure state evolved between safe state and failed state using fuzzy logic provides an alert signal to take appropriate additional preventive measures to save the system from entering into the failed state to the extent possible.


2019 ◽  
Author(s):  
Marjin Martens ◽  
Ralf De Wolf ◽  
Lieven De Marez
Keyword(s):  

OUGHTOPIA ◽  
2020 ◽  
Vol 35 (2) ◽  
pp. 247-282
Author(s):  
In-Kyun Kim ◽  
Myeong-Geon Koh

Sign in / Sign up

Export Citation Format

Share Document