On Tools for Socio-Technical Security Analysis

نویسندگان

  • Ana Ferreira
  • Rosario Giustolisi
  • Jean-Louis Huynen
  • Gabriele Lenzini
چکیده

Many systems are hacked daily and apparently without much effort (e.g., see [1]). This happens because hackers prefer not to break security mechanisms immediately, but rather to target unguarded components first. Such components, e.g., users and human-computer ceremonies [2], are hacked by exploiting cognitive features (e.g., trust) and people’s dismay with ill-designed interfaces. These user-related components are often ignored in traditional security analysis. Thus, it should not surprise that systems proved secure may fail especially when they run in different contexts from those wherein they have been proven secure. We are interested to define a framework where to model and analyse a system’s social and technical components. We describe here a variant of Bella et al.’s model [3]. Therein Alice and Bob are not metaphors for communicating processes, but personae linked a set of interaction layers (see Fig. 1 and its caption) that connect humans and computers and, via the network, them with other computers and users. On top of this model we define an intruder. It controls the network, as in classical Dolev-Yao [4], and also the application, the user interfaces, and the context. When using its full power the intruder can influence the components and the user behaviour, and so security depends on what happens across all layers: the analysis of security results richer, and we talk of sociotechnical security analysis. Studying socio-technical security compels us to revise traditional analysis techniques. Depending on the focus of the analysis, in fact, we may need different methodologies and tools. An analysis focusing more on the technical side (communicating processes, applications and interfaces) and with attackers controlling the networks and/or the interfaces, requires tools to reason about the behaviour of software components. An analysis addressing more the social side (persona and user behaviour) requires to observe and reason about users interacting with the system, so a research methodology proper of social and cognitive sciences. In the sequel, we comment on methodologies and tools that we evaluated and selected in two experiments concerning socio-technical understanding of the security of TLS certificate validation. We have successfully applied formal methods (model checking) when considering layers “network”

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461)

This report documents the program and the outcomes of Dagstuhl Seminar 16461 “Assessing ICT Security Risks in Socio-Technical Systems”. As we progress from classic mechanical or electrical production systems, over ICT systems, to socio-technical systems, risk assessment becomes increasingly complex and difficult. Risk assessment for traditional engineering systems assumes the systems to be dete...

متن کامل

Information security culture - from analysis to change

Information Security Culture includes all socio-cultural measures that support technical security methods, so that information security becomes a natural aspect in the daily activity of every employee. To apply these socio-cultural measures in an effective and efficient way, certain management models and tools are needed. In our research we developed a framework analyzing the security culture o...

متن کامل

Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach

Security has been a growing concern for most large organizations, especially financial and government institutions, as security breaches in the socio-technical systems they depend on are costing billions. A major reason for these breaches is that socio-technical systems are designed in a piecemeal rather than a holistic fashion that leaves parts of a system vulnerable. To tackle this problem, w...

متن کامل

STS-Tool 3.0: Maintaining Security in Socio-Technical Systems

In this paper, we present STS-Tool 3.0: a software tool that helps security requirement engineers in maintaining high level of security in socio-technical systems. STS-Tool 3.0 allows to specify social/organizational security requirements and to enforce them in part of the implementation of socio-technical systems.

متن کامل

From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis

Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied prospectively, the methodology guides analysts to assess socio-technical vulnerabilities in a system, helping them to evaluate their choices in designing security policies and controls. But the methodolog...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013