Security Requirements Elicitation

Author(s):  
Manish Gupta

Information security is becoming increasingly important and more complex as organizations are increasingly adopting electronic channels for managing and conducting business. However, state-of-the-art systems design methods have ignored several aspects of security that arise from human involvement or due to human factors. The chapter aims to highlight issues arising from coalescence of fields of systems requirements elicitation, information security, and human factors. The objective of the chapter is to investigate and suggest an agenda for state of human factors in information assurance requirements elicitation from perspectives of both organizations and researchers. Much research has been done in the area of requirements elicitation, both systems and security, but, invariably, human factors are not been taken into account during information assurance requirements elicitation. The chapter aims to find clues and insights into acquisition behavior of human factors in information assurance requirements elicitation and to illustrate current state of affairs in information assurance and requirements elicitation and why inclusion of human factors is required.

2011 ◽  
Author(s):  
Karen Feigh ◽  
Zarrin Chua ◽  
Chaya Garg ◽  
Alan Jacobsen ◽  
John O'Hara ◽  
...  

Author(s):  
K. Feigh ◽  
Z. Chua ◽  
C. Garg ◽  
A. Jacobsen ◽  
J. O'Hara ◽  
...  

Author(s):  
Lech J. Janczewski ◽  
Andrew M. Colarik

The current state of the information security domain in the United States and much of the rest of the industrialized world can best be characterized as overly optimistic. The protection of computing systems and telecommunication infrastructures from unauthorized usage, manipulation, and sabotage faces serious challenges to ensure ongoing serviceability. This is especially true when we consider our growing dependence on these infrastructures. The state of affairs regarding the security aspects of these systems is even worse. Peter G. Neumann of the Computer Science Laboratory at SRI International in Menlo Park, California states:


2018 ◽  
pp. 53-60
Author(s):  
Oleg Danilyan ◽  
Оleksandr Dzоban

The purpose of the article is to elucidate the connection between the process of European integration and the state of its information security. Apply the whole complex of philosophical general scientific, and specific methods of scientific research, which are inherent in political science, in their interconnection and complementarity. For Ukraine, the movement toward European integration is a question of the effectiveness of its inclusion in the existing system of distribution of functions and roles in the modern world political and economic system, way of modernizing the economy, overcoming the technological backwardness, attract foreign investment and new technologies, creating new jobs, improving the competitiveness of domestic producers, access to world markets, primarily the EU market. It is proved that such a sphere remains one of the most problematic to date, especially if to speak about the situation in the East of Ukraine. The continued fighting, lack of interest of the parties in the conduct of public talks and a cease-fire, the inability to conduct appropriate actions in the framework of the Minsk agreements on the demarcation line and a number of other destructive phenomena do not contribute to the further development of relations with the EU. The European Union is constantly on notice that the danger in the East is a danger for the whole of Europe, and therefore for further development of integration processes require a ceasefire and a transition to practical implementation of the Minsk agreements. The current state of Affairs in this sphere does not allow to hope for fast improvements and so you need to move from rhetoric to action. As a result, it is concluded that information security is especially important for the stable public and state development, and its role and significance is growing significantly in modern conditions.


2020 ◽  
Vol 6 (2) ◽  
pp. 31-35
Author(s):  
Amyrtaa K. Mongush ◽  
Igor N. Karmanov

Entry of modern society into the information stage of development wake, information security one of the most important problems of our time. The article discusses the possibility of automating the design of an integrated information security system. One of the key stages in the design of an information security system is the assessment of the current state of the information security system through audit. An information security audit allows identifying all vulnerabilities in the system. To automate the detection of vulnerabilities of the investigated object, network scanners are considered. The use of scanners allows solving the problems of identification and analysis of vulnerabilities. A scheme for automating the design of physical protection systems is also considered. In conclusion, the advantages of automating the design of an information protection system are noted, frequently used software tools and utilities for automating individual stages of the design of information protection systems are presented.


Chelovek RU ◽  
2020 ◽  
pp. 217-220
Author(s):  
Natalia Rostova ◽  

The article analyzes the current state of affairs in philosophy in relation to the question «What is hu-man?». In this regard, the author identifies two strategies – post-humanism and post-cosmism. The strat-egy of post-humanism is to deny the idea of human exceptionalism. Humanity becomes something that can be thought of out of touch with human and understood as a right that extends to the non-human world. Post-cosmism, on the contrary, advocated the idea of ontological otherness of the human. Re-sponding to the challenges of anthropological catastrophe, its representatives propose a number of new anthropological projects.


2010 ◽  
Vol 27 (4) ◽  
pp. 45-67
Author(s):  
Sayed Sikandar Shah ◽  
Mek Wok Mahmud

As an intellectual process, critical thinking plays a dynamic role in reconstructing human thought. In Islamic legal thought, this intellectual tool was pivotal in building a full-fledged jurisprudential system during the golden age of Islamic civilization. With the solidification of the science of Islamic legal theory and the entrenchment of classical Islamic jurisprudence, this process abated somewhat. Recent Islamic revival movements have engendered a great zeal for reinstituting this process. The current state of affairs in constructing and reconstructing Islamic jurisprudence by and large do not, however, reflect the dynamic feature of intellectual thought in this particular discipline. Thus this article attempts to briefly delineate this concept, unveil the reality on the ground, and identify some hands-on strategies for applying critical thinking in contemporary ijtihad.


Author(s):  
O. Semenenko ◽  
Y. Dobrovolsky ◽  
V. Koverga ◽  
O. Sechenev

Evolution of security technologies shows that only the concept of an integrated approach to information security can provide modern information security requirements. A comprehensive approach means the complex development of all the necessary methods and means of information protection. Today, the information exchange and information systems in the Ministry of Defense of Ukraine have certain means and approaches to the destruction of information, but each of them has different estimates of the effectiveness of their use, as well as different cost of their purchase and use. Therefore, the main purpose of the article is to carry out a comprehensive analysis of means of destroying confidential information of methods of its destruction in order to formulate practical recommendations for choosing the most effective and economically feasible for the Ministry of Defense of Ukraine. The perfection of methods and means of destroying information from magnetic media is an important element of modern information security. The results of the analysis carried out in the article are the disclosure of the main features of modern devices for the elimination of magnetic records, as well as the ability to formulate a list of basic requirements for modern devices for the destruction of information from magnetic media. Today, technical means of information security, in particular, the elimination of information on magnetic media, are constantly being improved, absorbing the latest advances in modern security technologies. Their model range, which takes into account the diversity of customer requirements, such as the type of energy supply, the level of mobility, reliability and operating conditions, expands. All this determines the relevance of research topics in this direction in the future.


Author(s):  
Farhan Zahid

Pakistan remains a country of vital importance for Al-Qaeda. It is primarily because of Al-Qaeda’s advent, rise and shelter and not to mention the support the terrorist organization found at the landscape of Pakistan during the last two decades. The emergence of in Pakistan can be traced back to the Afghan War (1979-89), with a brief sabbatical in Sudan the Islamist terrorist group rose to gain prominence after shifting back to Afghanistan. It then became a global ‘Islamist’ terrorist entity while based in neighboring Afghanistan and found safe havens in the erstwhile tribal areas of Pakistan in the aftermath of the US invasion of Afghanistan in 2001. Prior to its formation in 1988 in Peshawar (Pakistan), it had worked as Maktab al-Khidmat (Services Bureau) during the Afghan War.2 It had its roots in Pakistan, which had become a transit point of extremists en route to Afghanistan during the War. All high profile Al-Qaeda leaders, later becoming high-value targets, and members of its central Shura had lived in Pakistan at one point in their lives. That is the very reason the Al-Qaeda in Pakistan is termed as Al-Qaeda Core or Central among law enforcement practitioners and intelligence communities. Without going into details of Al-Qaeda’s past in Pakistan the aim of this article is to focus on its current state of affairs and what future lies ahead of it in Pakistan.


2021 ◽  
Vol 13 (2) ◽  
pp. 703
Author(s):  
Megan Drewniak ◽  
Dimitrios Dalaklis ◽  
Anastasia Christodoulou ◽  
Rebecca Sheehan

In recent years, a continuous decline of ice-coverage in the Arctic has been recorded, but these high latitudes are still dominated by earth’s polar ice cap. Therefore, safe and sustainable shipping operations in this still frozen region have as a precondition the availability of ice-breaking support. The analysis in hand provides an assessment of the United States’ and Canada’s polar ice-breaking program with the purpose of examining to what extent these countries’ relevant resources are able to meet the facilitated growth of industrial interests in the High North. This assessment will specifically focus on the maritime transportation sector along the Northwest Passage and consists of four main sections. The first provides a very brief description of the main Arctic passages. The second section specifically explores the current situation of the Northwest Passage, including the relevant navigational challenges, lack of infrastructure, available routes that may be used for transit, potential choke points, and current state of vessel activity along these routes. The third one examines the economic viability of the Northwest Passage compared to that of the Panama Canal; the fourth and final section is investigating the current and future capabilities of the United States’ and Canada’s ice-breaking fleet. Unfortunately, both countries were found to be lacking the necessary assets with ice-breaking capabilities and will need to accelerate their efforts in order to effectively respond to the growing needs of the Arctic. The total number of available ice-breaking assets is impacting negatively the level of support by the marine transportation system of both the United States and Canada; these two countries are facing the possibility to be unable to effectively meet the expected future needs because of the lengthy acquisition and production process required for new ice-breaking fleets.


Sign in / Sign up

Export Citation Format

Share Document