In Cyber-Space No One Can Hear You S·CREAM - A Root Cause Analysis for Socio-Technical Security

نویسندگان

  • Ana Ferreira
  • Jean-Louis Huynen
  • Vincent Koenig
  • Gabriele Lenzini
چکیده

Inspired by the root cause analysis techniques that in the field of safety research and practice help investigators understand the reasons of an incident, this paper investigates the use of root cause analysis in security. We aim at providing a systematic method for the security analyst to identify the socio-technical attack modes that can potentially endanger a system’s security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis

Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied prospectively, the methodology guides analysts to assess socio-technical vulnerabilities in a system, helping them to evaluate their choices in designing security policies and controls. But the methodolog...

متن کامل

Teaching Business Systems Analysis to Cyber-Security Managers: a Socio-Technical perspective

This paper reports a teaching experience of business systems analysis (BSA) to cyber-security management students. This unit places great emphasis on connecting security function to business requirements from a socio-technical (ST) perspective. Specific topics of lectures and seminars are discussed to outline the necessity of tuning and tailoring BSA content to fit the needs of contemporary sec...

متن کامل

Psychological Factors Affecting on the Culture and Awareness of Cyber Security in During of Covid-19 Outbreak

The aim of this study was to investigate the psychological factors affecting the culture and awareness of cyber security in the period of Covid-19 outbreak by qualitative method and theme analysis. Research data from upstream documents that include all valid articles published in 2020 to 2022 inside and outside the country, with 4 keywords (culture, awareness, cyber security, psychological fact...

متن کامل

In Cyber Space No One can Hear You Scream

As the telecommunications industry endeavours to reinvent itself, the effective management and exploitation of information, data delivered in context, is now the key weapon in gaining and retaining customers. The data management challenges in an environment of massively growing data volumes and complexity introduced by distributed processing are outlined. A framework and methodology for the man...

متن کامل

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015