Cargando…

Protecting Information with Cybersecurity

Virtually every system today confronts the cybersecurity threat, and the system architect must have the ability to integrate security features and functions as integral elements of a system. In this chapter, we survey this large, complex, and rapidly evolving subject with the goal of giving the read...

Descripción completa

Detalles Bibliográficos
Autores principales: Borky, John M., Bradley, Thomas H.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7122347/
http://dx.doi.org/10.1007/978-3-319-95669-5_10
_version_ 1783515398560284672
author Borky, John M.
Bradley, Thomas H.
author_facet Borky, John M.
Bradley, Thomas H.
author_sort Borky, John M.
collection PubMed
description Virtually every system today confronts the cybersecurity threat, and the system architect must have the ability to integrate security features and functions as integral elements of a system. In this chapter, we survey this large, complex, and rapidly evolving subject with the goal of giving the reader a level of understanding that will enable incorporation of cybersecurity within an MBSE process and effective interaction with security experts. We begin by introducing the subject and describing the primary aspects of the current cybersecurity environment. We define fundamental terminology and concepts used in the cybersecurity community, and we describe the basic steps to include cybersecurity risk in an overall risk management process, which is a central SE responsibility. We then list some of the primary sources of information, guidance, and standards upon which a systems engineer can and should draw. Next, we summarize the major aspects of incorporating security controls in a system architecture and design to achieve an acceptable level of security risk for a system. We extend this to the increasingly important world of service-oriented, network-based, and distributed systems. We conclude with a brief presentation of the application of MBSAP to the specific issues of cybersecurity and summarize the characteristics of a Secure Software Development Life Cycle aimed at creating software with minimum flaws and vulnerabilities. We illustrate the application of cybersecurity principles and practices using the Smart Microgrid example. Chapter Objective: the reader will be able to apply the MBSAP methodology to systems and enterprises that require protection of sensitive data and processes against the growing cybersecurity threat and to work effectively with cybersecurity specialists to achieve effective secure system solutions.
format Online
Article
Text
id pubmed-7122347
institution National Center for Biotechnology Information
language English
publishDate 2018
record_format MEDLINE/PubMed
spelling pubmed-71223472020-04-06 Protecting Information with Cybersecurity Borky, John M. Bradley, Thomas H. Effective Model-Based Systems Engineering Article Virtually every system today confronts the cybersecurity threat, and the system architect must have the ability to integrate security features and functions as integral elements of a system. In this chapter, we survey this large, complex, and rapidly evolving subject with the goal of giving the reader a level of understanding that will enable incorporation of cybersecurity within an MBSE process and effective interaction with security experts. We begin by introducing the subject and describing the primary aspects of the current cybersecurity environment. We define fundamental terminology and concepts used in the cybersecurity community, and we describe the basic steps to include cybersecurity risk in an overall risk management process, which is a central SE responsibility. We then list some of the primary sources of information, guidance, and standards upon which a systems engineer can and should draw. Next, we summarize the major aspects of incorporating security controls in a system architecture and design to achieve an acceptable level of security risk for a system. We extend this to the increasingly important world of service-oriented, network-based, and distributed systems. We conclude with a brief presentation of the application of MBSAP to the specific issues of cybersecurity and summarize the characteristics of a Secure Software Development Life Cycle aimed at creating software with minimum flaws and vulnerabilities. We illustrate the application of cybersecurity principles and practices using the Smart Microgrid example. Chapter Objective: the reader will be able to apply the MBSAP methodology to systems and enterprises that require protection of sensitive data and processes against the growing cybersecurity threat and to work effectively with cybersecurity specialists to achieve effective secure system solutions. 2018-09-09 /pmc/articles/PMC7122347/ http://dx.doi.org/10.1007/978-3-319-95669-5_10 Text en © Springer International Publishing AG, part of Springer Nature 2019 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Borky, John M.
Bradley, Thomas H.
Protecting Information with Cybersecurity
title Protecting Information with Cybersecurity
title_full Protecting Information with Cybersecurity
title_fullStr Protecting Information with Cybersecurity
title_full_unstemmed Protecting Information with Cybersecurity
title_short Protecting Information with Cybersecurity
title_sort protecting information with cybersecurity
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7122347/
http://dx.doi.org/10.1007/978-3-319-95669-5_10
work_keys_str_mv AT borkyjohnm protectinginformationwithcybersecurity
AT bradleythomash protectinginformationwithcybersecurity