Cargando…

Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)

Security analysis is an essential activity in security engineering to identify potential system vulnerabilities and specify security requirements in the early design phases. Due to the increasing complexity of modern systems, traditional approaches lack the power to identify insecure incidents cause...

Descripción completa

Detalles Bibliográficos
Autores principales: Yu, Jinghua, Wagner, Stefan, Luo, Feng
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7959614/
https://www.ncbi.nlm.nih.gov/pubmed/33817012
http://dx.doi.org/10.7717/peerj-cs.362
_version_ 1783664987715141632
author Yu, Jinghua
Wagner, Stefan
Luo, Feng
author_facet Yu, Jinghua
Wagner, Stefan
Luo, Feng
author_sort Yu, Jinghua
collection PubMed
description Security analysis is an essential activity in security engineering to identify potential system vulnerabilities and specify security requirements in the early design phases. Due to the increasing complexity of modern systems, traditional approaches lack the power to identify insecure incidents caused by complex interactions among physical systems, human and social entities. By contrast, the System-Theoretic Process Analysis for Security (STPA-Sec) approach views losses as resulting from interactions, focuses on controlling system vulnerabilities instead of external threats, and is applicable for complex socio-technical systems. However, the STPA-Sec pays less attention to the non-safety but information-security issues (e.g., data confidentiality) and lacks efficient guidance for identifying information security concepts. In this article, we propose a data-flow-based adaption of the STPA-Sec (named STPA-DFSec) to overcome the mentioned limitations and elicit security constraints systematically. We use the STPA-DFSec and STPA-Sec to analyze a vehicle digital key system and investigate the relationship and differences between both approaches, their applicability, and highlights. To conclude, the proposed approach can identify information-related problems more directly from the data processing aspect. As an adaption of the STPA-Sec, it can be used with other STPA-based approaches to co-design systems in multi-disciplines under the unified STPA framework.
format Online
Article
Text
id pubmed-7959614
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-79596142021-04-02 Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) Yu, Jinghua Wagner, Stefan Luo, Feng PeerJ Comput Sci Computer Networks and Communications Security analysis is an essential activity in security engineering to identify potential system vulnerabilities and specify security requirements in the early design phases. Due to the increasing complexity of modern systems, traditional approaches lack the power to identify insecure incidents caused by complex interactions among physical systems, human and social entities. By contrast, the System-Theoretic Process Analysis for Security (STPA-Sec) approach views losses as resulting from interactions, focuses on controlling system vulnerabilities instead of external threats, and is applicable for complex socio-technical systems. However, the STPA-Sec pays less attention to the non-safety but information-security issues (e.g., data confidentiality) and lacks efficient guidance for identifying information security concepts. In this article, we propose a data-flow-based adaption of the STPA-Sec (named STPA-DFSec) to overcome the mentioned limitations and elicit security constraints systematically. We use the STPA-DFSec and STPA-Sec to analyze a vehicle digital key system and investigate the relationship and differences between both approaches, their applicability, and highlights. To conclude, the proposed approach can identify information-related problems more directly from the data processing aspect. As an adaption of the STPA-Sec, it can be used with other STPA-based approaches to co-design systems in multi-disciplines under the unified STPA framework. PeerJ Inc. 2021-02-03 /pmc/articles/PMC7959614/ /pubmed/33817012 http://dx.doi.org/10.7717/peerj-cs.362 Text en © 2021 Yu et al. https://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Computer Networks and Communications
Yu, Jinghua
Wagner, Stefan
Luo, Feng
Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)
title Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)
title_full Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)
title_fullStr Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)
title_full_unstemmed Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)
title_short Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)
title_sort data-flow-based adaption of the system-theoretic process analysis for security (stpa-sec)
topic Computer Networks and Communications
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7959614/
https://www.ncbi.nlm.nih.gov/pubmed/33817012
http://dx.doi.org/10.7717/peerj-cs.362
work_keys_str_mv AT yujinghua dataflowbasedadaptionofthesystemtheoreticprocessanalysisforsecuritystpasec
AT wagnerstefan dataflowbasedadaptionofthesystemtheoreticprocessanalysisforsecuritystpasec
AT luofeng dataflowbasedadaptionofthesystemtheoreticprocessanalysisforsecuritystpasec