A Systems Engineering Approach for Assured Cyber Systems

نویسنده

  • Michael R. Grimaila
چکیده

Systems Engineering (SE) has gained favor as a means to tame the complexity of modern systems, specifically the design, analysis, and development of complex systems. This paper describes a SE approach for system assurance of modern Information Technology (IT) centric “cyber systems”. In this paper, we discuss recent trends in information security towards the establishment of security patterns and identify key security patterns for the development of cyber systems. Specifically, this paper provides a cursory review of security patterns and highlights the utilization of key cyber patterns during the SE development process for a given cyber system. SE functional decomposition and system integration activities are described as they pertain to meeting formal system assurance claims resulting in secure and assured cyber systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

Design of Observer-based H∞ Controller for Robust Stabilization of Networked Systems Using Switched Lyapunov Functions

In this paper, H∞ controller is synthesized for networked systems subject to random transmission delays with known upper bound and different occurrence probabilities in the both of feedback (sensor to controller) and forward (controller to actuator) channels. A remote observer is employed to improve the performance of the system by computing non-delayed estimates of the sates. The closed-loop s...

متن کامل

Managing Environment and Adaptation Risks for the Internetware Paradigm

Internetware is receiving increasing attention. It envisions a new, yet promising software engineering paradigm for constructing complex systems that are situated in open and dynamic networked environments. Typical examples of Internetware systems include Internet-based and cyber-physical systems. These systems, although having addressed some practical needs, may still be subject to various env...

متن کامل

A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors

Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013