Skip to main content
main-content

Tipp

Weitere Artikel dieser Ausgabe durch Wischen aufrufen

Erschienen in: Wireless Personal Communications 3/2021

05.04.2019

A Threat Analysis of Human Bond Communications

verfasst von: Geir M. Køien

Erschienen in: Wireless Personal Communications | Ausgabe 3/2021

Einloggen, um Zugang zu erhalten
share
TEILEN

Abstract

In this paper we provide a high-level threat analysis of Human Bond Communications, using the STRIDE methodology. To this end, we provide an overview over Human Bond Communications and define a sample set of cases. The Human Bond Communications cases are such that the threats literally may be existential by nature. We also outline the STRIDE threat analysis methodology, and apply it to the sample set of cases previously defined. The threat analysis is carried out at a high abstraction level to highlight the major threats.
Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Abomhara, M., Gerdes, M., & Køien, G. M. (2015). A stride-based threat model for telehealth systems. Norsk informasjonssikkerhetskonferanse (NISK), 8(1), 82–96. Abomhara, M., Gerdes, M., & Køien, G. M. (2015). A stride-based threat model for telehealth systems. Norsk informasjonssikkerhetskonferanse (NISK), 8(1), 82–96.
2.
Zurück zum Zitat Amunts, K., Ebell, C., Muller, J., Telefont, M., Knoll, A., & Lippert, T. (2016). The human brain project: creating a european research infrastructure to decode the human brain. Neuron, 92(3), 574–581. CrossRef Amunts, K., Ebell, C., Muller, J., Telefont, M., Knoll, A., & Lippert, T. (2016). The human brain project: creating a european research infrastructure to decode the human brain. Neuron, 92(3), 574–581. CrossRef
3.
Zurück zum Zitat Barfield, W. (2015). Fundamentals of wearable computers and augmented reality. Boca Raton: CRC Press. CrossRef Barfield, W. (2015). Fundamentals of wearable computers and augmented reality. Boca Raton: CRC Press. CrossRef
4.
Zurück zum Zitat Barker, E. (2016). Recommendation for key management: Part 1: General. Special Publication 800-57, NIST, Gaithersburg, MD 20899–8930. Barker, E. (2016). Recommendation for key management: Part 1: General. Special Publication 800-57, NIST, Gaithersburg, MD 20899–8930.
5.
Zurück zum Zitat Biggio, B., Freeman, D., Miller, B., & Sinha, A. (2017). 10th international workshop on artificial intelligence and security (aisec 2017). In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 2621–2622). ACM. Biggio, B., Freeman, D., Miller, B., & Sinha, A. (2017). 10th international workshop on artificial intelligence and security (aisec 2017). In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 2621–2622). ACM.
6.
Zurück zum Zitat Billinghurst, M., Clark, A., Lee, G., et al. (2015). A survey of augmented reality. Foundations and Trends in Human-Computer Interaction, 8(2–3), 73–272. CrossRef Billinghurst, M., Clark, A., Lee, G., et al. (2015). A survey of augmented reality. Foundations and Trends in Human-Computer Interaction, 8(2–3), 73–272. CrossRef
7.
Zurück zum Zitat Bostrom, N. (2014). Superintelligence: Paths, dangers, strategies. Oxford: Oxford University Press. Bostrom, N. (2014). Superintelligence: Paths, dangers, strategies. Oxford: Oxford University Press.
8.
Zurück zum Zitat Brandt, M., Khondoker, R., Marx, R., & Bayarou, K. (2014). Security analysis of software defined networking protocols—openflow, of-config and ovsdb. In The 2014 IEEE fifth international conference on communications and electronics (ICCE 2014), DA NANG, Vietnam. Brandt, M., Khondoker, R., Marx, R., & Bayarou, K. (2014). Security analysis of software defined networking protocols—openflow, of-config and ovsdb. In The 2014 IEEE fifth international conference on communications and electronics (ICCE 2014), DA NANG, Vietnam.
9.
Zurück zum Zitat Cavoukian, A. (2009). Privacy by design. Take the challenge. Information and privacy commissioner of Ontario, Canada. Cavoukian, A. (2009). Privacy by design. Take the challenge. Information and privacy commissioner of Ontario, Canada.
10.
Zurück zum Zitat Dauer, P., Khondoker, R., Marx, R., & Bayarou, K. (2015). Security analysis of software defined networking applications for monitoring and measurement: sflow and bigtap. In The 10th international conference on future internet (pp. 51–56). ACM. Dauer, P., Khondoker, R., Marx, R., & Bayarou, K. (2015). Security analysis of software defined networking applications for monitoring and measurement: sflow and bigtap. In The 10th international conference on future internet (pp. 51–56). ACM.
11.
Zurück zum Zitat De Schutter, E. (2018). Deep learning and computational neuroscience. De Schutter, E. (2018). Deep learning and computational neuroscience.
12.
Zurück zum Zitat Dick, P. K. (1966). We can remember it for you wholesale. The Magazine of Fantasy and Science Fiction. Dick, P. K. (1966). We can remember it for you wholesale. The Magazine of Fantasy and Science Fiction.
15.
Zurück zum Zitat Dolev, D., & Yao, A. C. (1983). On the security of public-key protocols. IEEE Transactions on Information Theory, 29(2), 198–208. MathSciNetCrossRef Dolev, D., & Yao, A. C. (1983). On the security of public-key protocols. IEEE Transactions on Information Theory, 29(2), 198–208. MathSciNetCrossRef
16.
Zurück zum Zitat Earnshaw, R. A. (2014). Virtual reality systems. Cambridge: Academic press. Earnshaw, R. A. (2014). Virtual reality systems. Cambridge: Academic press.
19.
Zurück zum Zitat Georgescu, M., Hazeyama, H., Okuda, T., Kadobayashi, Y., & Yamaguchi, S. (2016). The stride towards ipv6: A comprehensive threat model for ipv6 transition technologies. In ICISSP (pp. 243–254). Georgescu, M., Hazeyama, H., Okuda, T., Kadobayashi, Y., & Yamaguchi, S. (2016). The stride towards ipv6: A comprehensive threat model for ipv6 transition technologies. In ICISSP (pp. 243–254).
20.
Zurück zum Zitat Grzonka, D., Jakobik, A., Kołodziej, J., & Pllana, S. (2017). Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security. Future Generation Computer Systems. Grzonka, D., Jakobik, A., Kołodziej, J., & Pllana, S. (2017). Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security. Future Generation Computer Systems.
21.
Zurück zum Zitat ITU-R BT.2020 (2015). Parameter values for ultra-high definition television systems for production and international programme exchange. Recommendation BT.2020, ITU, Geneva, Switzerland. ITU-R BT.2020 (2015). Parameter values for ultra-high definition television systems for production and international programme exchange. Recommendation BT.2020, ITU, Geneva, Switzerland.
22.
Zurück zum Zitat ITU-R BT.2100 (2017). Image parameter values for high dynamic range television for use in production and international programme exchange. Recommendation BT.2100, ITU, Geneva, Switzerland. ITU-R BT.2100 (2017). Image parameter values for high dynamic range television for use in production and international programme exchange. Recommendation BT.2100, ITU, Geneva, Switzerland.
23.
Zurück zum Zitat ITU-R M.2083 (2015). IMT Vision - Framework and overall objectives of the future development of IMT for 2020 and beyond. Recommendation M.2083, ITU, Geneva, Switzerland. ITU-R M.2083 (2015). IMT Vision - Framework and overall objectives of the future development of IMT for 2020 and beyond. Recommendation M.2083, ITU, Geneva, Switzerland.
25.
Zurück zum Zitat Kruger, J., & Dunning, D. (1999). Unskilled and unaware of It: How difficulties in recognizing one’s own incompetence lead to inflated self-assessments. Journal of personality and social psychology, 77(6), 1121. CrossRef Kruger, J., & Dunning, D. (1999). Unskilled and unaware of It: How difficulties in recognizing one’s own incompetence lead to inflated self-assessments. Journal of personality and social psychology, 77(6), 1121. CrossRef
26.
Zurück zum Zitat Minderer, M., Harvey, C. D., Donato, F., & Moser, E. I. (2016). Neuroscience: Virtual reality explored. Nature, 533(7603), 324–325. CrossRef Minderer, M., Harvey, C. D., Donato, F., & Moser, E. I. (2016). Neuroscience: Virtual reality explored. Nature, 533(7603), 324–325. CrossRef
28.
Zurück zum Zitat O’Toole, M. T. (Ed.), (2005). Miller-Keane encyclopedia and dictionary of medicine, nursing, and allied health, 7 edn. Saunders. O’Toole, M. T. (Ed.), (2005). Miller-Keane encyclopedia and dictionary of medicine, nursing, and allied health, 7 edn. Saunders.
29.
Zurück zum Zitat Perrow, C. (1999). Normal accidents. Princeton: Princeton University Press. Perrow, C. (1999). Normal accidents. Princeton: Princeton University Press.
30.
Zurück zum Zitat Roche, J. P., & Hansen, M. R. (2015). On the horizon: Cochlear implant technology. Otolaryngologic Clinics of North America, 48(6), 1097–1116. CrossRef Roche, J. P., & Hansen, M. R. (2015). On the horizon: Cochlear implant technology. Otolaryngologic Clinics of North America, 48(6), 1097–1116. CrossRef
31.
Zurück zum Zitat Seigneur, J. M., Kölndorfer, P., Busch, M., & Hochleitner, C. (2013). A survey of trust and risk metrics for a byod mobile worker world: Third international conference on social eco-informatics. Seigneur, J. M., Kölndorfer, P., Busch, M., & Hochleitner, C. (2013). A survey of trust and risk metrics for a byod mobile worker world: Third international conference on social eco-informatics.
32.
Zurück zum Zitat Shah, S. Y., Paulovicks, B., & Zerfos, P. (2016). Data-at-rest security for spark. In Big Data (Big Data), 2016 IEEE international conference on (pp. 1464–1473). IEEE. Shah, S. Y., Paulovicks, B., & Zerfos, P. (2016). Data-at-rest security for spark. In Big Data (Big Data), 2016 IEEE international conference on (pp. 1464–1473). IEEE.
33.
Zurück zum Zitat Shostack, A. (2014). Threat modeling: Designing for security (1st ed.). Hoboken: Wiley Publishing. Shostack, A. (2014). Threat modeling: Designing for security (1st ed.). Hoboken: Wiley Publishing.
34.
Zurück zum Zitat Silver, D., Schrittwieser, J., Simonyan, K., Antonoglou, I., Huang, A., Guez, A., et al. (2017). Mastering the game of go without human knowledge. Nature, 550(7676), 354. CrossRef Silver, D., Schrittwieser, J., Simonyan, K., Antonoglou, I., Huang, A., Guez, A., et al. (2017). Mastering the game of go without human knowledge. Nature, 550(7676), 354. CrossRef
35.
Zurück zum Zitat Singh, S., Okun, A., & Jackson, A. (2017). Artificial intelligence: Learning to play go from scratch. Nature, 550(7676), 336. CrossRef Singh, S., Okun, A., & Jackson, A. (2017). Artificial intelligence: Learning to play go from scratch. Nature, 550(7676), 336. CrossRef
36.
Zurück zum Zitat Smart, N. (2017). Google infrastructure security design overview; Google cloud whitepaper. Cloud whitepaper, Google. Smart, N. (2017). Google infrastructure security design overview; Google cloud whitepaper. Cloud whitepaper, Google.
37.
Zurück zum Zitat Smart, N. P., Rijmen, V., Stam, M., Warinschi, B., & Watson, G. (2014). Study on cryptographic protocols. Report TP-06-14-085-EN-N, ENISA. Smart, N. P., Rijmen, V., Stam, M., Warinschi, B., & Watson, G. (2014). Study on cryptographic protocols. Report TP-06-14-085-EN-N, ENISA.
38.
Zurück zum Zitat Taleb, N. N. (2012). Antifragile: Things that gain from disorder. New York: Random House. Taleb, N. N. (2012). Antifragile: Things that gain from disorder. New York: Random House.
40.
Zurück zum Zitat Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard law review (pp. 193–220). Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard law review (pp. 193–220).
41.
Zurück zum Zitat Williams, A. M., Liu, Y., Regner, K. R., Jotterand, F., Liu, P., & Liang, M. (2018). Artificial intelligence, physiological genomics, and precision medicine. Physiological Genomics. Williams, A. M., Liu, Y., Regner, K. R., Jotterand, F., Liu, P., & Liang, M. (2018). Artificial intelligence, physiological genomics, and precision medicine. Physiological Genomics.
42.
Zurück zum Zitat Williams, I., & Yuan, X. (2015). Evaluating the effectiveness of microsoft threat modeling tool. In Proceedings of the 2015 information security curriculum development conference (p. 9). ACM. Williams, I., & Yuan, X. (2015). Evaluating the effectiveness of microsoft threat modeling tool. In Proceedings of the 2015 information security curriculum development conference (p. 9). ACM.
43.
Zurück zum Zitat Zerfos, P., Yeo, H., Paulovicks, B. D., & Sheinin, V. (2015). Sdfs: Secure distributed file system for data-at-rest security for hadoop-as-a-service. In Big Data (Big Data), 2015 IEEE international conference on (pp. 1262–1271). IEEE. Zerfos, P., Yeo, H., Paulovicks, B. D., & Sheinin, V. (2015). Sdfs: Secure distributed file system for data-at-rest security for hadoop-as-a-service. In Big Data (Big Data), 2015 IEEE international conference on (pp. 1262–1271). IEEE.
Metadaten
Titel
A Threat Analysis of Human Bond Communications
verfasst von
Geir M. Køien
Publikationsdatum
05.04.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06340-y

Weitere Artikel der Ausgabe 3/2021

Wireless Personal Communications 3/2021 Zur Ausgabe