Skip to main content
Top

2014 | OriginalPaper | Chapter

16. Evaluating the Implications of Attack and Security Patterns with Premortems

Authors : Shamal Faily, Simon Parkin, John Lyle

Published in: Cyberpatterns

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Security patterns are a useful way of describing, packaging and applying security knowledge which might otherwise be unavailable. However, because patterns represent partial knowledge of a problem and solution space, there is little certainty that addressing the consequences of one problem won’t introduce or exacerbate another. Rather than using patterns exclusively to explore possible solutions to security problems, we can use them to better understand the security problem space. To this end, we present a framework for evaluating the implications of security and attack patterns using premortems: scenarios describing a failed system that invites reasons for its failure. We illustrate our approach using an example from the EU FP 7 webinos project.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Schumacher M, Fernandez E, Hybertson D, Buschmann F. Security patterns: integrating security and systems engineering. Chichester: Wiley; 2005. Schumacher M, Fernandez E, Hybertson D, Buschmann F. Security patterns: integrating security and systems engineering. Chichester: Wiley; 2005.
3.
go back to reference Fernandez EB, Yoshioka N, Washizaki H, Jürjens J, VanHilst M, Pernul G. Using security patterns to develop secure systems. In: Mouratidis H, editor. Software engineering for secure systems: industrial and research perspectives. , New York: IGI Global; 2011. p. 16–31. Fernandez EB, Yoshioka N, Washizaki H, Jürjens J, VanHilst M, Pernul G. Using security patterns to develop secure systems. In: Mouratidis H, editor. Software engineering for secure systems: industrial and research perspectives. , New York: IGI Global; 2011. p. 16–31.
4.
go back to reference Chiesa R, Ducci S, Ciappi S. Profiling hackers: the science of criminal profiling as applied to the world of hacking. 1st ed. Boston: Auerbach Publications; 2008.CrossRef Chiesa R, Ducci S, Ciappi S. Profiling hackers: the science of criminal profiling as applied to the world of hacking. 1st ed. Boston: Auerbach Publications; 2008.CrossRef
5.
go back to reference Atzeni A, Cameroni C, Faily S, Lyle J, Flechais I. Here’s johnny: a methodology for developing attacker personas. In: Proceedings of the 2011 sixth international conference on availability, reliability and security. ARES ’11. Washington: IEEE Computer Society; 2011. p. 722–7. http://dx.doi.org/10.1109/ARES.2011.115. Atzeni A, Cameroni C, Faily S, Lyle J, Flechais I. Here’s johnny: a methodology for developing attacker personas. In: Proceedings of the 2011 sixth international conference on availability, reliability and security. ARES ’11. Washington: IEEE Computer Society; 2011. p. 722–7. http://​dx.​doi.​org/​10.​1109/​ARES.​2011.​115.
7.
go back to reference Klein G. Performing a project premortem. Harvard Bus Rev. 2007;85(9):18–9. Klein G. Performing a project premortem. Harvard Bus Rev. 2007;85(9):18–9.
8.
go back to reference van Lamsweerde A. Requirements engineering: from system goals to UML models to software specifications. West Sussex: Wiley; 2009. van Lamsweerde A. Requirements engineering: from system goals to UML models to software specifications. West Sussex: Wiley; 2009.
9.
go back to reference Faily S, Fléchais I. Towards tool-support for usable secure requirements engineering with CAIRIS. Int J Secure Software Eng. 2010;1(3):56–70. Faily S, Fléchais I. Towards tool-support for usable secure requirements engineering with CAIRIS. Int J Secure Software Eng. 2010;1(3):56–70.
11.
go back to reference Faily S, Fléchais I. Eliciting policy requirements for critical national infrastructure using the iris framework. Int J Secure Software Eng. 2011;2(4):114–9.CrossRef Faily S, Fléchais I. Eliciting policy requirements for critical national infrastructure using the iris framework. Int J Secure Software Eng. 2011;2(4):114–9.CrossRef
12.
go back to reference Gamma E, Helm R, Johnson R, Vlissides J. Design patterns: elements of reusable object-oriented software. Boston: Addison-Wesley Longman; 1995. Gamma E, Helm R, Johnson R, Vlissides J. Design patterns: elements of reusable object-oriented software. Boston: Addison-Wesley Longman; 1995.
14.
go back to reference Faily S, Lyle J, Namiluko C, Atzeni A, Cameroni C. Model-driven architectural risk analysis using architectural and contextualised attack patterns. In: Proceedings of the workshop on model-driven security. MDsec ’12. New York: ACM; 2012. p. 3:1–3:6. http://doi.acm.org/10.1145/2422498.2422501. Faily S, Lyle J, Namiluko C, Atzeni A, Cameroni C. Model-driven architectural risk analysis using architectural and contextualised attack patterns. In: Proceedings of the workshop on model-driven security. MDsec ’12. New York: ACM; 2012. p. 3:1–3:6. http://​doi.​acm.​org/​10.​1145/​2422498.​2422501.
15.
go back to reference Faily S, Fléchais I. Analysing and visualising security and usability in iris. 2012 seventh international conference on availability, reliability and security 2010; p. 543–8. Faily S, Fléchais I. Analysing and visualising security and usability in iris. 2012 seventh international conference on availability, reliability and security 2010; p. 543–8.
18.
go back to reference Lyle J, Monteleone S, Faily S, Patti D, Ricciato F. Cross-platform access control for mobile web applications. In: 2012 IEEE international symposium on policies for distributed systems and networks (POLICY);2012. p. 37–44. Lyle J, Monteleone S, Faily S, Patti D, Ricciato F. Cross-platform access control for mobile web applications. In: 2012 IEEE international symposium on policies for distributed systems and networks (POLICY);2012. p. 37–44.
24.
go back to reference Chesbrough HW. Open innovation: the new imperative for creating and profiting from technology. Boston: Harvard Business School Press; 2003. Chesbrough HW. Open innovation: the new imperative for creating and profiting from technology. Boston: Harvard Business School Press; 2003.
Metadata
Title
Evaluating the Implications of Attack and Security Patterns with Premortems
Authors
Shamal Faily
Simon Parkin
John Lyle
Copyright Year
2014
DOI
https://doi.org/10.1007/978-3-319-04447-7_16

Premium Partner