On Tools for Socio-Technical Security Analysis
نویسندگان
چکیده
Many systems are hacked daily and apparently without much effort (e.g., see [1]). This happens because hackers prefer not to break security mechanisms immediately, but rather to target unguarded components first. Such components, e.g., users and human-computer ceremonies [2], are hacked by exploiting cognitive features (e.g., trust) and people’s dismay with ill-designed interfaces. These user-related components are often ignored in traditional security analysis. Thus, it should not surprise that systems proved secure may fail especially when they run in different contexts from those wherein they have been proven secure. We are interested to define a framework where to model and analyse a system’s social and technical components. We describe here a variant of Bella et al.’s model [3]. Therein Alice and Bob are not metaphors for communicating processes, but personae linked a set of interaction layers (see Fig. 1 and its caption) that connect humans and computers and, via the network, them with other computers and users. On top of this model we define an intruder. It controls the network, as in classical Dolev-Yao [4], and also the application, the user interfaces, and the context. When using its full power the intruder can influence the components and the user behaviour, and so security depends on what happens across all layers: the analysis of security results richer, and we talk of sociotechnical security analysis. Studying socio-technical security compels us to revise traditional analysis techniques. Depending on the focus of the analysis, in fact, we may need different methodologies and tools. An analysis focusing more on the technical side (communicating processes, applications and interfaces) and with attackers controlling the networks and/or the interfaces, requires tools to reason about the behaviour of software components. An analysis addressing more the social side (persona and user behaviour) requires to observe and reason about users interacting with the system, so a research methodology proper of social and cognitive sciences. In the sequel, we comment on methodologies and tools that we evaluated and selected in two experiments concerning socio-technical understanding of the security of TLS certificate validation. We have successfully applied formal methods (model checking) when considering layers “network”
منابع مشابه
Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461)
This report documents the program and the outcomes of Dagstuhl Seminar 16461 “Assessing ICT Security Risks in Socio-Technical Systems”. As we progress from classic mechanical or electrical production systems, over ICT systems, to socio-technical systems, risk assessment becomes increasingly complex and difficult. Risk assessment for traditional engineering systems assumes the systems to be dete...
متن کاملInformation security culture - from analysis to change
Information Security Culture includes all socio-cultural measures that support technical security methods, so that information security becomes a natural aspect in the daily activity of every employee. To apply these socio-cultural measures in an effective and efficient way, certain management models and tools are needed. In our research we developed a framework analyzing the security culture o...
متن کاملDealing with Security Requirements for Socio-Technical Systems: A Holistic Approach
Security has been a growing concern for most large organizations, especially financial and government institutions, as security breaches in the socio-technical systems they depend on are costing billions. A major reason for these breaches is that socio-technical systems are designed in a piecemeal rather than a holistic fashion that leaves parts of a system vulnerable. To tackle this problem, w...
متن کاملSTS-Tool 3.0: Maintaining Security in Socio-Technical Systems
In this paper, we present STS-Tool 3.0: a software tool that helps security requirement engineers in maintaining high level of security in socio-technical systems. STS-Tool 3.0 allows to specify social/organizational security requirements and to enforce them in part of the implementation of socio-technical systems.
متن کاملFrom Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis
Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied prospectively, the methodology guides analysts to assess socio-technical vulnerabilities in a system, helping them to evaluate their choices in designing security policies and controls. But the methodolog...
متن کامل