Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461)

نویسندگان

  • Tyler W. Moore
  • Christian W. Probst
  • Kai Rannenberg
  • Michel van Eeten
چکیده

This report documents the program and the outcomes of Dagstuhl Seminar 16461 “Assessing ICT Security Risks in Socio-Technical Systems”. As we progress from classic mechanical or electrical production systems, over ICT systems, to socio-technical systems, risk assessment becomes increasingly complex and difficult. Risk assessment for traditional engineering systems assumes the systems to be deterministic. In non-deterministic systems, standard procedure is to fix those factors that are not deterministic. These techniques do not scale to ICT systems where many risks are hard to trace due to the immaterial nature of information. Beyond ICT systems, socio-technical systems also contain human actors as integral parts of the system. In such socio-technical systems there may occur unforeseen interactions between the system, the environment, and the human actors, especially insiders. Assessing ICT security risks for sociotechnical systems and their economic environment requires methods and tools that integrate relevant socio-technical security metrics. In this seminar we investigated systematic methods and tools to estimate those ICT security risks in socio-technical systems and their economic environment. In particular, we searched for novel security risk assessment methods that integrate different types of socio-technical security metrics. Seminar November 13–18, 2016 – http://www.dagstuhl.de/16461 1998 ACM Subject Classification J.4 Social and Behavioral Sciences, K.6.5 Security and Protection

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Opportunities and Risks of Blockchain Technologies

This report documents the program and the outcomes of Dagstuhl Seminar 17132 “Opportunities and Risks of Blockchain Technologies”. Blockchain-based applications such as Bitcoin or Ethereum are emerging technologies, but a dramatic increase in industrial and academic interest in the technology is evident. Start-ups and large financial players are working intensely on blockchain-based application...

متن کامل

Assuring Resilience, Security and Privacy for Flexible Networked Systems and Organisations (Dagstuhl Seminar 15151)

Dagstuhl Seminar 15151 entitled “Assuring Resilience, Security and Privacy for Flexible Networked Systems and Organisations” brought together researchers from different disciplines in order to establish a research agenda for making future services in our increasingly connected world more resilient and secure, as well as addressing privacy. The participants came from a range of disciplines cover...

متن کامل

Randomized Timed and Hybrid Models for Critical Infrastructures (Dagstuhl Seminar 14031)

From 05.01.2014 to 10.01.2014, the Seminar 14021 in Symmetric Cryptography was held in Schloss Dagstuhl – Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this pa...

متن کامل

Security and Dependability for Federated Cloud Platforms (Dagstuhl Seminar 12281)

AI meets Formal Software Development (Dagstuhl Seminar 12271) Alan Bundy, Dieter Hutter, Cliff B. Jones, and J Strother Moore . . . . . . . . . . . . . . . . 1 Architecture-Driven Semantic Analysis of Embedded Systems (Dagstuhl Seminar 12272) Peter Feiler, Jérôme Hugues, and Oleg Sokolsky . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Security and Dependability for Federat...

متن کامل

Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051)

This report documents the program and the outcomes of Dagstuhl Seminar 16051 “Modern Cryptography and Security: An Inter-Community Dialogue”. Seminar January 31 to February 5, 2016 – http://www.dagstuhl.de/16051 1998 ACM Subject Classification E.3 Data Encryption, K.6.5 Security and Protection

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Dagstuhl Reports

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2016