Misuse Cases: Use Cases with Hostile Intent

نویسنده

  • Ian F. Alexander
چکیده

Eliciting security requirements Security requirements exist because people and the negative agents that they create (such as computer viruses) pose real threats to systems. Security differs from all other specification areas in that someone is deliberately threatening to break the system. Employing use and misuse cases to model and analyze scenarios in systems under design can improve security by helping to mitigate threats. Some misuse cases occur in highly specific situations, whereas others continually threaten systems. For instance, a car is most likely to be stolen when parked and unattended, whereas a Web server might suffer a denial-of-service attack at any time. You can develop misuse and use cases recursively, going from system to subsystem levels or lower as necessary. Lower-level cases can highlight aspects not considered at higher levels, possibly forcing another analysis. The approach offers rich possibilities for exploring, understanding, and validating the requirements in any direction. Drawing the agents and misuse cases explicitly helps focus attention on the elements of the scenario. Let’s compare Figure 1 to games such as chess or Go. A team’s best strategy consists of thinking ahead to the other team’s best move and acting to block it. In Figure 1, the use cases appear on the left; the misuse cases are on the right. The misuse threat is car theft, the use-case player is the lawful driver, and the misuse-case player the car thief. The driver’s freedom to drive the car is at risk if the thief can steal the car. The driver must be able to lock the car—a derived requirement—to mitigate the threat. This is at the top level of analysis. The next level begins when you consider the thief’s response. If he or she breaks the door lock and shorts the ignition, this requires another mitigating approach, such as locking the transmission. In focus

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Misuse cases with non-quality requirements

Misuse cases are like use cases, but with bad intent. They can be used when defining non-quality attributes. This paper describes the main concepts concerning misuse cases and shows ways to present them. A literature study is performed to find answers to research questions.

متن کامل

Mal-Activity Diagrams for Capturing Attacks on Business Processes

Security is becoming an increasingly important issue for IT systems, yet it is often dealt with as separate from mainstream systems and software development and in many cases neglected or addressed post-hoc, yielding costly and unsatisfactory solutions. One idea to improve the focus on security might be to include such concerns into mainstream diagram notations used in information systems analy...

متن کامل

Modelling the Interplay of Conflicting Goals with Use and Misuse Cases

Business goals often conflict. Conflicting goals can come from within an organisation, or may appear as external threats: goals may be friendly or hostile. Relationships between goals therefore need to go beyond conventional and/or inclusion. This paper suggests an economical set of four relationships: threatens, mitigates, aggravates, conflicts with. It gives examples of three general types of...

متن کامل

Building Security In

usability, and, of course, security. An earlier contribution to this department stressed the importance of going beyond functional requirements. The authors introduced misuse or abuse cases as counterparts to use cases and explained that although use cases capture functional requirements, abuse cases describe how users can misuse a system with malicious intent, thereby identifying additional se...

متن کامل

Assessment of maternal attributions of infant's hostile intent and its use in child maltreatment prevention/intervention efforts.

C OGNITIVE MODELS OF AGGRESSION PROPOSE that when an individual attributes hostile intent to another person’s behavior, these attributions increase the likelihood of aggression toward that person. This propositionhasbeensupportedbyalargebodyof literature. Similar speculations are found in cognitive behavioral models ofchildphysicalabuse. Specifically, thesemodelspropose that, when parents make ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Software

دوره 20  شماره 

صفحات  -

تاریخ انتشار 2003