• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

On the inability of existing security models to cope with data mobility in dynamic organizations,” (2008)

by T Dimkov, Q Tang, P Hartel
Add To MetaCart

Tools

Sorted by:
Results 1 - 5 of 5

Representing humans in system security models: An actor-network approach

by Wolter Pieters - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
"... Abstract System models to assess the vulnerability of information systems to security threats typically represent a physical infrastructure (buildings) and a digital infrastructure (computers and networks), in combination with an attacker traversing the system while acquiring credentials. Other hum ..."
Abstract - Cited by 9 (1 self) - Add to MetaCart
Abstract System models to assess the vulnerability of information systems to security threats typically represent a physical infrastructure (buildings) and a digital infrastructure (computers and networks), in combination with an attacker traversing the system while acquiring credentials. Other humans are generally not included, as their behaviour is considered more difficult to express. We propose a graph-based reference model for reasoning about access in system models including human actions, inspired by the sociological actor-network theory, treating humans and non-humans symmetrically. This means that humans can employ things to gain access (an attacker gains access to a room by means of a key), but things can also employ humans to gain access (a USB stick gains access to a computer by means of an employee), leading to a simple but expressive model. The model has the additional advantage that it is not based on containment, an increasingly problematic notion in the age of disappearing boundaries between systems. Based on the reference model, we discuss algorithms for finding attacks, as well as examples. The reference model can serve as a starting point for discussing representations of human behaviour in system models, and for including human behaviour in other than graph-based approaches.
(Show Context)

Citation Context

... traverse. The model of the infrastructure is typically a static tree of containment relations between objects, if necessary augmented with additional (network) connections. The attacker then traverses the infrastructure by obtaining credentials and thereby gaining additional access to objects, which can again contain credentials, et cetera. An attack is successful when the attacker in the end has access to some designated asset. Such models are not sufficient when (1) other things than the attacker exhibit mobility properties, and (2) organisational and social aspects (interaction) can occur [8]. Recently, vulnerability models have been proposed that include the mobility aspect [4, 3]. These models allow extension of vulnerability analysis from digital to physical contexts, as the moving around of actors and items in buildings can now be expressed. In principle, such models can also be used to express interaction, but they do not provide explicit arguments for why human actors have been included in a specific way. This means that either distinctions are proposed between actors (moving humans) and non-actors (credentials) [3], or a construct of delegation is added, representing the po...

unknown title

by Wouter Segeth , 2009
"... www.sentinels.nl ..."
Abstract - Add to MetaCart
www.sentinels.nl

cope with data mobility

by Trajce Dimkov, Qiang Tang, Pieter Hartel , 2008
"... On the inability of existing security models to ..."
Abstract - Add to MetaCart
On the inability of existing security models to
(Show Context)

Citation Context

...o other security models. We analyze the characteristics of these models with respect to the requirements presented in section 3. A detailed analysis is presented in the extended version of the report =-=[13]-=-. 54.1 TAM and Secure Tropos One of the first steps when looking at a security issue is to create a threat model [14]. To generate the threats, the threat model needs to provide a security model of t...

ANKH: Information Threat Analysis with

by Actor-network Hypergraphs, Wolter Pieters
"... Abstract. Traditional information security modelling approaches often focus on containment of assets within boundaries. Due to what is called de-perimeterisation, such boundaries, for example in the form of clearly separated company networks, disappear. This paper argues that in a deperimeterised si ..."
Abstract - Add to MetaCart
Abstract. Traditional information security modelling approaches often focus on containment of assets within boundaries. Due to what is called de-perimeterisation, such boundaries, for example in the form of clearly separated company networks, disappear. This paper argues that in a deperimeterised situation a focus on containment in security modelling is ineffective. Most importantly, the tree structure induced by the notion of containment is insufficient to model the interactions between digital, physical and social aspects of security. We use the sociological framework of actor-network theory to model information security starting from group membership instead of containment. The model is based on hypergraphs, and is also applicable to physical and social security measures. We provide algorithms for threat finding as well as examples.
(Show Context)

Citation Context

...ty to express multiple paths between entities. Moreover, in Scott’s model it is possible to “teleport” an entity from one location to another, ignoring layers of protection that may reside in between =-=[8]-=-. Dragovic and Crowcroft [6, 7] address the protection given by the containment and the associated exposure of the data, but still rely on a containment tree to model paths to the assets. Franqueira e...

inconsistencies between security policies

by Trajce Dimkov, Wolter Pieters, Pieter Hartel
"... Portunes: generating attack scenarios by finding ..."
Abstract - Add to MetaCart
Portunes: generating attack scenarios by finding
(Show Context)

Citation Context

...curity area, when combined, may lead to an attack. Currently, the majority of the security models focus on digital security, and only few consider physical security or security awareness of employees =-=[4]-=-. This paper tackles the problem of presenting and generating attack scenarios in which an insider combines digital, physical and social means to achieve his goal. The paper addresses the insider prob...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University