Categorization of Standards, Guidelines and Tools for Secure System Design for Critical Infrastructure IT in the Cloud

Author(s):  
Sarita Paudel ◽  
Markus Tauber ◽  
Christian Wagner ◽  
Aleksandar Hudic ◽  
Wee-Kong Ng
2017 ◽  
Vol 139 (03) ◽  
pp. S9-S12
Author(s):  
Brian Connett ◽  
Bryan O’Halloran

This article presents a combination of known models and system design techniques that result in an architectural framework that is predictive. The article also provides a methodical recommendation that develops the way defense of a cyber critical infrastructure can be most effective. Firstly, historical background has been provided to motivate the current political theme, followed by modeling theory that has been published. Classical systems engineering foundations are reviewed to adapt modeling environment to the current cyber conflict problem in a way that allows a systems owner to posture most effectively against anomalies across the network of communication nodes. The implication of the model presented in the article is that a protection posture can be estimated, and can quickly turn into a balanced engagement between the attacker and defender. When optimized within decision algorithms, data will exist to illuminate what process can be implemented in defense. Using classical systems engineering fundamentals, modeling simulation, and proven mathematical approaches, this research seeks to support such implementation.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 1822-1831 ◽  
Author(s):  
Yu Tai ◽  
Wei Hu ◽  
Dejun Mu ◽  
Baolei Mao ◽  
Lu Zhang

Author(s):  
Shamal Faily ◽  
Ivan Fléchais

Despite existing work on dealing with security and usability concerns during the early stages of design, there has been little work on synthesising the contributions of these fields into processes for specifying and designing systems. Without a better understanding of how to deal with both concerns at an early stage, the design process risks disenfranchising stakeholders, and resulting systems may not be situated in their contexts of use. This paper presents the IRIS process framework, which guides technique selection when specifying usable and secure systems. The authors illustrate the framework by describing a case study where the process framework was used to derive missing requirements for an information security policy for a UK water company following reports of the Stuxnet worm. The authors conclude with three lessons informing future efforts to integrate Security, Usability, and Requirements Engineering techniques for secure system design.


Sign in / Sign up

Export Citation Format

Share Document