Cargando…
Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)
Security analysis is an essential activity in security engineering to identify potential system vulnerabilities and specify security requirements in the early design phases. Due to the increasing complexity of modern systems, traditional approaches lack the power to identify insecure incidents cause...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7959614/ https://www.ncbi.nlm.nih.gov/pubmed/33817012 http://dx.doi.org/10.7717/peerj-cs.362 |
_version_ | 1783664987715141632 |
---|---|
author | Yu, Jinghua Wagner, Stefan Luo, Feng |
author_facet | Yu, Jinghua Wagner, Stefan Luo, Feng |
author_sort | Yu, Jinghua |
collection | PubMed |
description | Security analysis is an essential activity in security engineering to identify potential system vulnerabilities and specify security requirements in the early design phases. Due to the increasing complexity of modern systems, traditional approaches lack the power to identify insecure incidents caused by complex interactions among physical systems, human and social entities. By contrast, the System-Theoretic Process Analysis for Security (STPA-Sec) approach views losses as resulting from interactions, focuses on controlling system vulnerabilities instead of external threats, and is applicable for complex socio-technical systems. However, the STPA-Sec pays less attention to the non-safety but information-security issues (e.g., data confidentiality) and lacks efficient guidance for identifying information security concepts. In this article, we propose a data-flow-based adaption of the STPA-Sec (named STPA-DFSec) to overcome the mentioned limitations and elicit security constraints systematically. We use the STPA-DFSec and STPA-Sec to analyze a vehicle digital key system and investigate the relationship and differences between both approaches, their applicability, and highlights. To conclude, the proposed approach can identify information-related problems more directly from the data processing aspect. As an adaption of the STPA-Sec, it can be used with other STPA-based approaches to co-design systems in multi-disciplines under the unified STPA framework. |
format | Online Article Text |
id | pubmed-7959614 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-79596142021-04-02 Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) Yu, Jinghua Wagner, Stefan Luo, Feng PeerJ Comput Sci Computer Networks and Communications Security analysis is an essential activity in security engineering to identify potential system vulnerabilities and specify security requirements in the early design phases. Due to the increasing complexity of modern systems, traditional approaches lack the power to identify insecure incidents caused by complex interactions among physical systems, human and social entities. By contrast, the System-Theoretic Process Analysis for Security (STPA-Sec) approach views losses as resulting from interactions, focuses on controlling system vulnerabilities instead of external threats, and is applicable for complex socio-technical systems. However, the STPA-Sec pays less attention to the non-safety but information-security issues (e.g., data confidentiality) and lacks efficient guidance for identifying information security concepts. In this article, we propose a data-flow-based adaption of the STPA-Sec (named STPA-DFSec) to overcome the mentioned limitations and elicit security constraints systematically. We use the STPA-DFSec and STPA-Sec to analyze a vehicle digital key system and investigate the relationship and differences between both approaches, their applicability, and highlights. To conclude, the proposed approach can identify information-related problems more directly from the data processing aspect. As an adaption of the STPA-Sec, it can be used with other STPA-based approaches to co-design systems in multi-disciplines under the unified STPA framework. PeerJ Inc. 2021-02-03 /pmc/articles/PMC7959614/ /pubmed/33817012 http://dx.doi.org/10.7717/peerj-cs.362 Text en © 2021 Yu et al. https://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Computer Networks and Communications Yu, Jinghua Wagner, Stefan Luo, Feng Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) |
title | Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) |
title_full | Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) |
title_fullStr | Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) |
title_full_unstemmed | Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) |
title_short | Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) |
title_sort | data-flow-based adaption of the system-theoretic process analysis for security (stpa-sec) |
topic | Computer Networks and Communications |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7959614/ https://www.ncbi.nlm.nih.gov/pubmed/33817012 http://dx.doi.org/10.7717/peerj-cs.362 |
work_keys_str_mv | AT yujinghua dataflowbasedadaptionofthesystemtheoreticprocessanalysisforsecuritystpasec AT wagnerstefan dataflowbasedadaptionofthesystemtheoreticprocessanalysisforsecuritystpasec AT luofeng dataflowbasedadaptionofthesystemtheoreticprocessanalysisforsecuritystpasec |