Modelling human threats in security ceremonies1

نویسندگان

چکیده

Socio-Technical Systems (STSs) combine the operations of technical systems with choices and intervention humans, namely users systems. Designing such is far from trivial due to interaction heterogeneous components, including hardware components software applications, physical elements as tickets, user interfaces, touchscreens displays, notably, humans. While possible security issues about are well known yet continuously investigated, focus this article on various levels threat that human actors may pose, namely, ceremonies. The approach formally model threats systematically verify whether they can break properties a few running examples: two currently deployed Deposit-Return (DRSs) variant we designed strengthen them. real-world DRSs found support differently, some relevant fail, our verified meet all properties. Our distributed interacting: it formalises humans potential threatening because execute rules encode specific in addition being honest, is, follow prescribed system; additionally, exchange information or objects directly, hence practically favour each other although no form collusion prescribed. We start by introducing four different models, succumb against strongest model, four. question then arises what meaningful combinations would not This leads definition lattice models general methodology traverse verifying node executed example for sake demonstration. thus modular extensible include additional threats, potentially even borrowed existing works, and, consequently, growth corresponding lattice. STSs easily become very complex, deem modularity extensibility key factors. current computer-assisted tool put test but proves be sufficient.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security threats in Prepaid Mobile

Recent communications environment significantly expand the mobile environment. Prepaid mobile services for 3G networks enables telecommunication to sign up new users by utilizing the latest in converged billing technologies. The worldwide mobile communication market is exploding, and 50 percent of subscribers are expected to use prepaid billing . Prepaid services are driving mobile communicatio...

متن کامل

Security Threats in Advanced Metering.dvi

Advanced metering infrastructure (AMI) is drawing more and more attention due to various benefits which it brings. Compared to traditional power grid systems or advanced meter reading (AMR) systems, AMI systems possess capabilities to provide improved management and predictability of power utilization, to monitor and detect fault occurrences, and to conserve energy. However, behind the various ...

متن کامل

Bluetooth Security Threats

Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentia...

متن کامل

Investigating Cyber Security Threats:

This report focuses on how federal agencies define success in computer crime investigations and how they can facilitate the development and refinement of a comprehensive law enforcement strategy for addressing cyber threats. Through interviews with experienced computer crime investigators from the Federal Bureau of Investigation, the U.S. Secret Service, and the Air Force Office of Special Inve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Security

سال: 2022

ISSN: ['0926-227X', '1875-8924']

DOI: https://doi.org/10.3233/jcs-210059