Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment
نویسندگان
چکیده
We propose a controlled experiment to assess how well creativity techniques can support social engineering threat assessment. Social engineering threats form the basis for the elicitation of security requirements, a type of quality requirement, which state what threat should be prevented or mitigated. The proposed experiment compares a serious game and the Morphological Forced Connections technique with regard to their productivity, as well as completeness and precision. Social engineering is the illicit acquisition of information about computer systems by primarily non-technical means. Although the technical security of most critical systems is usually being regarded, such systems remain highly vulnerable to attacks from social engineers that exploit humans to obtain information (e.g., phishing) [3, 4]. To develop systems that are more resilient to threats from social engineering, the security requirements should specifically address such threats. Moreover, performing a threat assessment of social engineering is hard, because an attacker (a) does not need any (advanced) technical skills, and (b) can conduct an attack without advanced equipment. Hence, anyone can inflict significant damage through social engineering. We have developed a serious game for social engineering [1, 2] (see Fig. 1), which is suitable for educating non-security experts about the threats of social engineering, as well as for eliciting security requirements to prevent and mitigate social engineering threats. The empirical elicitation and assessment of security requirements concerning social engineering is difficult, as it is not the system’s security measures themselves that are causing the security threat, but unpredictability of humans with system knowledge. For example, humans can give away passwords. In the business context, these techniques additionally rely on the participation of common employees, who posses the required practical and domain knowledge. 5 http://www.checkpoint.com/press/downloads/social-engineering-survey.pdf Copyright 2017 for this paper by its authors. Copying permitted for private and academic purposes. 2 Kristian Beckers, Veronika Fries, Eduard C. Groen, and Sebastian Pape Figure 1: Game on Social Engineering This makes foreseeing possible social engineering threats the main challenge. The elicitation of requirements to this end draws on the stakeholders’ ability to make new associations, and therefore requires creativity techniques for the combination of existing (work) practices and potential threats. In order to validate the suitability and effectiveness of our game (cf. [1, 2]) for eliciting security requirements concerning social engineering, we propose to conduct an experiment of 90 minutes in which we compare its yield for social engineering threat elicitation with that of the Morphological Forced Connections technique [5]. This established creativity technique was chosen because of its suitability to transform a combination of preexisting (work) aspects into new conceptual combinations (i.e., a threat) through inference. The context of our experiment is the CreaRE workshop. Social engineering threats for a predefined scenario are elicited from the participants in either of two conditions. Our hypothesis concerns the productivity and precision of both approaches. We hypothesise that the serious game is more productive and precise than the creativity technique. We define true positives (TP) as correctly identified threats (i.e., correct result that experts have previously found or or that they verify during the experiment). False positives (FP) are threats reported by participants but not verified by expert review. We measure productivity in the number of TP discovered during a limited time frame and precision as the percentage of TP of the overall discovered threats. The independent variable is the technique used for the social engineering threat assessment, with two levels: ”social engineering game” and ”Morphological Forced Connections technique”. The dependent variables are the total number of threats elicited with each method, the number of threats that are identified to be correct, and the time required to identify these threats. The correctness is validated by security experts reviewing the elicited threats and an assessment of the participants during the experiment. The results of our experiment should provide an indication of how suitable the two creativity techniques are for performing social engineering threat elicitation. We need additional research to address the fundamental threat of social engineering to security.
منابع مشابه
Engaging Stakeholders in Scenario-Based Requirements Engineering with Gamification
The purpose of this paper is to evaluate the effectiveness of gamification in requirements engineering in order to improve stakeholder engagement. We developed an online digital platform for scenariobased RE supported with gamification. Derived from an in-depth literature study, we selected user stories complemented with scenarios from behavior-driven development (BDD) as a method to express st...
متن کاملRequirements Engineering and Creativity: An Innovative Approach Based on a Model of the Pragmatics of Communication
This paper proposes the application to requirements elicitation of an innovative creativity technique based on a model of the pragmatics of communication, the Elementary Pragmatic Model (EPM). The EPM has been used to define a creative process, called EPMcreate that consists of sixteen steps. In each step, the problem is analyzed according to one elementary behavior identified by the EPM. Each ...
متن کاملCreative Leaf: A Creative iStar Modeling Tool
iStar models allow users to capture high-level social requirements, including alternatives and qualities. Typical approaches advocate discovering model content through traditional Requirements Engineering (RE) elicitation methods, such as interviews, observations, and domain documents. For the typical, familiar space of requirements, such techniques may be sufficient, but stakeholders may not a...
متن کاملGroup Versus Individual Use of an Optimized and the Full EPMcreate as Creativity Enhancement Techniques for Web Site Requirements Elicitation
[Context] Creativity is often needed in requirements elicitation, i.e., generating ideas for requirements, and therefore, techniques to enhance creativity are believed to be useful. [Objective] How does the size of a group using the EPMcreate creativity enhancement technique or an optimization of it, POEPMcreate, affect the group’s and each member of the group’s effectiveness in generating requ...
متن کاملDownsizing EPMcreate to Lighter Creativity Techniques for Requirements Elicitation
EPMcreate is a creativity technique for requirements elicitation based on a 16-step process. These steps suggest focusing on requirements related to every combination of two different target users or viewpoints. A series of experiments confirmed its feasibility; its applicability, both as individual and group technique; and its greater effectiveness than brainstorming. However, analysts involve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017