A Systems Approach for Eliciting Mission-Centric Security Requirements

11/02/2017
by   Bryan Carter, et al.
0

The security of cyber-physical systems is first and foremost a safety problem, yet it is typically handled as a traditional security problem, which means that solutions are based on defending against threats and are often implemented too late. This approach neglects to take into consideration the context in which the system is intended to operate, thus system safety may be compromised. This paper presents a systems-theoretic analysis approach that combines stakeholder perspectives with a modified version of Systems-Theoretic Accident Model and Process (STAMP) that allows decision-makers to strategically enhance the safety, resilience, and security of a cyber-physical system against potential threats. This methodology allows the capture of vital mission-specific information in a model, which then allows analysts to identify and mitigate vulnerabilities in the locations most critical to mission success. We present an overview of the general approach followed by a real example using an unmanned aerial vehicle conducting a reconnaissance mission.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/29/2020

Cyber-Physical Security Through Resiliency: A Systems-centric Approach

Cyber-physical systems (CPS) are often defended in the same manner as in...
research
12/21/2022

A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS

The widespread use of software-intensive cyber systems in critical infra...
research
12/05/2017

MISSION AWARE: Evidence-Based, Mission-Centric Cybersecurity Analysis

Currently, perimeter-based approaches are the mainstay of cybersecurity....
research
11/13/2021

Understanding and Assessment of Mission-Centric Key Cyber Terrains for joint Military Operations

Since the cyberspace consolidated as fifth warfare dimension, the differ...
research
02/09/2019

A Game of Drones: Cyber-Physical Security of Time-Critical UAV Applications with Cumulative Prospect Theory Perceptions and Valuations

The effective deployment of unmanned aerial vehicle (UAV) systems and se...
research
04/24/2013

Towards a Networks-of-Networks Framework for Cyber Security

Networks-of-networks (NoN) is a graph-theoretic model of interdependent ...
research
06/04/2020

Data-Flow-Based Extension of the System-Theoretic Process Analysis for Security (STPA-Sec)

Security analysis is an essential activity in security engineering to id...

Please sign up or login with your details

Forgot password? Click here to reset