Addressing Security Threat Analysis by Misuse Cases

Size: px
Start display at page:

Download "Addressing Security Threat Analysis by Misuse Cases"

Transcription

1 Addressing Security Threat Analysis by Misuse Cases 1 Munina Yusufu, 2 Weimin Pan, 3 Gulina Yusufu *1 School of Computer Science and Technology, Xinjiang Normal University, myusuf2005@gmail.com 2 School of Computer Science and Technology, Xinjiang Normal University, panweiminss@163.com 3 School of Education Science, Xinjiang Normal University, gln531@sohu.com Abstract Use cases are focused in the analysis of functional requirements, but not necessarily with nonfunctional requirements like all of those that are related with operational availability, performance, reliability, reuse and security. This paper discusses the approach to address security threat analysis by the development of misuse cases. We discuss the differences between misuse cases and security use cases, and present a template that is similar to a use case template discussed in [7], but focus it into a misuse case interpretation, and also add some extra properties. 1. Introduction Keywords: Misuse cases, System Security, Nonfunctional Requirements Use cases [12,13,14] are a scenario-based technique for requirements elicitation [9,15,16]. They are a modeling technique for analyze and specify functional requirements in an early stage [9,10,11]. They provide scenarios about how the system works when the user is interacting, and help to describe the requirements in a graphical way. A use case defines a goal-oriented set of interactions between external actors and the system and has several advantages, such as, reusability, easy to understand, and can be integrated with other analysis tools. A use case can serve as the basis for the estimating, scheduling, and validating effort. However, use cases are focused in the analysis of functional requirements, but not necessarily with non functional requirements like all of those that are related with operational availability, performance, reliability, reuse and security [2,8,23,24,25]. It is easy to make some assumptions that can be very important within the project [6], and if we ignore them, some problems can be generated during the next stages, deriving a premature implementation of the design. Sindre and Ophal [8] define security as the prevention of, or protection against, access to information by unauthorized recipients, and intentional but unauthorized destruction or alteration of that information, for example, the protection of the information against a misuse of the system. On security terms, it is important to consider what are the weakest points in the system. There can be some security holes that because a lack of design are not considered, and it can be a possible vulnerable point for a security attack. There are some methods to deal with the security of the system, for example, the i-framework [4], a goal oriented method that works with three elements: actors, intentional elements and links. Some methods create security requirements [8], while others just deal with the necessities of the primary requirements. But, they can be very inconsistent, they are not analyzing exactly in what cases can be applied, they are focused just in the point of view of the user, and sometimes for an overview of a program in general is very hard to discover in what specific parts they are effective. Also, to deal with the security problems, there are some cryptographic approaches that can help but, if they are not based in a very well designed system, they are not enough to build a secure application. They must work together with a well designed application, which can cover all the situations where they can apply [5]. Lately the application of use cases has been investigated in connection with security and safety requirements, in the form of misuse cases [1,3,5-8,18], or abuse cases [17, 19]. In this paper, we discuss the approach to address security threat analysis by the development of This work is funded by a National Natural Science Foundation of China under Grant No , a Scientific Research Program of the Higher Education Institution of Xinjiang under Grant No. XJEDU2011I40, a Natural Science Foundation of Xinjiang Uyghur Autonomous Region under Grant No A056, and a Computer Application Technology Key Disciplines Bidding Project of Xinjiang Normal University under Grant No. 12XSXZ0602. International Journal of Digital Content Technology and its Applications(JDCTA) Volume7,Number7,April 2013 doi: /jdcta.vol7.issue

2 misuse cases. We discuss the differences between misuse cases and security use cases, and present a template that focus into a misuse case interpretation, and also add some extra properties. The paper is organized as follow. We first introduce the concept of misuse case and present the investigation on the related work in section 2. In section 3 and 4, we discuss three ways that represent misuse cases diagrams, and a methodology that helps to put all the pieces together and to discover new components in the system s analysis. In section 5, we present a template that is similar to a use case template [7], but we focus it more into a misuse case interpretation, and also add some extra properties. According to the template, we give an example about an automated teller machine in section 6, and then have a conclusion in section Concept of misuse case and related work Use cases describe some functions that the system should do; when they are related with security issues, they model mechanisms to protect the system. For example, in an instant teller machine, one security requirement is the verification of the card holder and his PIN number. It specifies that each time a user introduces his card he must introduce a PIN to validate that is the cardholder. However, these requirements are vulnerable to security threats. An undesired user can try to guess the PIN number, and access illegally to the system. One approach to address security threat analysis is the development of misuse cases [2,22]. A set of use cases are taken from a positive point of view of the user ; misuse cases threat security requirements within a negative scenario [1]. All security requirements exist because people that create methods to attack the systems; employing use and misuse cases can improve security by helping to mitigate threats. Sindre and Opdahl [8] introduce the concept of Misuse cases to analyze the system in a hostile way. Formally, a misuse case is a special kind of use case, describing behavior that the system/entity owner does not want to occur. According to Laurie Williams [20], a misuse case is a tool for helping to think about your software the same way attackers do, and the goal of misuse case is to decide and document a priori how the software should react to illegitimate use. A misuse case is the opposite of a use case; it represents all the things that can attack a system, but, preserving all the properties of use cases. Misuse cases analyze the interaction between applications and the misusers whom seeks to break the security in the system (misactors). In the uses cases, an actor plays the role of the users that interact with the system; in the misuse cases, a misactor plays the function of the users and situations that can break the system. For example, in a car security system, a possible actor is the owner of the car; possible misactors are thieves and the weather. Misuse cases help to analyze threats, but, are not very helpful for the specification of security requirements. Donald Firesmith [2] proposes to include use and misuse cases in the analysis of the system, but remarking the differences between them (Table 1). Table 1. Differences between misuse cases and security use cases Misuse Cases Security Use Cases Usage Success Criteria Produced by Used by External Actors Driven by Analyze and specify Security threats Misuser Succeeds Security Team Security Team Misuser, User Asset Vulnerability Analysis Analyze and specify Security requirements Application Succeeds Security Team Requirements Team User Misuse Cases 3. Misuse case diagrams There are three ways to represent misuse cases diagrams as shown in Figure 1. The first way (a) is representing it in terms of normal use cases. It has the advantage that it is in the same terms; both, because both cases are represented at the same time it can be confusing. The second approach (b) is to separate totally the use cases and misuse cases, it easy to see how works each part, but, it is hard to identify the relations among them. It is necessary to see the whole case or requirement. 1041

3 For a better understanding of the diagram, Sindre and Ophal [8] propose to draw in black color all the issues related with the misuse cases (c). Representing them in this way permits to the designer to identify in a fast way how a misuse case and a misactor are related with the rest of the system. In this way the diagram is simple and legible. It is easy to distinguish what part of the diagram corresponds to the use and misuse cases and also, all their relations can be included. Traditionally, a use case represents functional requirements, and misuse cases represent nonfunctional requirements. Another way of looking at the role of misuse cases is to observe that the typical response to a threat is for the designers to create a subsystem whose function is to mitigate that threat. 4. Methodology Figure 1. Different representations of a misuse case diagram Once the main components in a system had been analyzed, Sindre and Ophadl suggest following a methodology that helps to put all the pieces together and to discover new components in the system s analysis [8]. 1. Concentrate in normal actors. The design must be focused mainly on the principal actors, regardless of security issues; a clear concept of the system in general will help to get a better security analysis. 2. Introduce the major mis-actors. Potential misactors are persons, but, there can be more possibilities around the system. In an online system two possible misactors can be a hacker and a competitor. 3. Investigate potential relations between misuse cases and cases. Analyze how possible attacks can affect to the system. For example, how a flood system in a car security system can affect the functionality in general. 4. Introduce new cases. Considering security issues can derive new cases, and at the same time, new mis-uses. 5. Continue with a more detailed requirements documentation. If there are more details about the requirements, or if, if there are new, we can have a wider view about what new options can be considered regarding to the security issues. 1042

4 5. Templates for use cases The template suggested is similar to a use case template [7], but we need to focus it into a misuse case interpretation, and also add some extra properties. Following the ecommerce system given in Figure 2, a template for the access control could be defined as follows as in Table 2: Basic Path. The principal ways that misuse can take to pursue its goal. Table 2. The template that focus on a misuse case interpretation Case Name: The name of the case. Summary: A brief description of the case. Extension/alternative paths/exceptional paths. Ways that the misuse can take, but, that are not very common. Because sometimes are not very visible, they can be the key point for an attack. Preconditions. Preconditions can be of three types: Triggers: Entry criteria, what initiates the use case. Assumptions: Conditions that must be true, but is not guaranteed by the system. Postconditions: They can be of three types: Worst case threat: Prevention guarantee: Describes the Describe the outcome if the misuse succeeds. guaranteed outcome whatever prevention path is followed. Author: Person analyzed case. who the Date: Date of the case analysis. Preconditions: Conditions that are ensured by the system. Detection guarantee: Describes the guaranteed outcome whatever detection path is followed. Related business rules. Particular points depending of the system and the business. Iteration. Covering the necessity of a superficial analysis and after, more detailed descriptions. Begin in an upper level; analyze each step in a more detailed way. Primary Actor or misuse profile. Scope. The scope of modeling, for example, an entire business, an information system, and so on. Level. The level of abstraction. It can be a summary, user goal, or subfunction. Stakeholders and risks. List of the various stakeholders and what their motivations are. Depending of the abstraction level, risks can be just described, or try to quantify in costs. Technology and data variations. Mention variations without giving the path for each case. 6. Eliciting exceptions and test cases A program failure leads to exceptions. The system under design should respond to undesirable events, and through it, prevent possibly failures. Through misuse case analysis is possible to discover exceptions, and handle them in a proper way. The candidate exception scenarios must be generated and requirements to prevent system failures from a proven list of exception classes must be elicited [1]. Any possible scenario can lead to a test case and misuse cases can help to explore and analyze conditions and exceptions. Products of use / misuse case analysis that can contribute to effective test planning include. Specific failure modes. Useful for real time, embedded and safety - related systems. Security threats. Useful for distributed commercial and government systems. Exception handling scenarios. Always useful. A test engineer could view misuse cases as existing purely to ensure better system testing. A quality engineer could equally well argue that their purpose is to improve the quality of delivered systems [1]. 7. Example Misuse case diagrams are represented within use case diagrams. Figure 2 shows an example about an automated teller machine [2]. The three main requirements are deposit funds, withdraw funds and query balance. There are security cases to control access, ensure privacy, integrity and to ensure nonrepudiation of transactions. These user cases are specified to protect the actors (users) from three 1043

5 security threats (misuse cases): spoof user, invade privacy and perpetrate fraud, which can be done by a cracker or a thief (misactors). It is important to remark that a user can activate or not a use case, it is represented by lines and arrows. When the case must be activated by a user or case, it is represented by an arrow. When it could be activated by a user or case, it is represented by a line. Figure 2. An example about an automated teller machine. The following steps documents the case Access Control, for further information, [2] presents the documentation of the other cases. Case Name: Access Control. Summary: Access control is the extent to which a business enterprise, application, component or center controls access by its externals. It consists of identification, authentication and authorization. Author: Donald G. Firesmith Date: June Basic Path. Attempted spoofing using valid user identity. Attempted identity and authentication theft. Attempted spoofing using social engineering. Alternative paths. The misuser can quit at any point. Preconditions. The misuser has no valid means of user identification. The misuser has no valid means or user authentication. The misuser has a valid means of user identification enabling the impersonation of a valid user that is authorized to use a protected resource. The misuser does not have an associated valid means of user authentication. The misuser has basic knowledge of the organization. Postconditions: The system shall not have allowed the misuser to steal the user s means of authentication. The system shall not have authenticated the misuser as a valid user. The system shall not have authorized the misuser to perform any transaction that requires authentication. The system shall have recorded the access control failure. The system shall have prevented the misuser from stealing the user s means of identification and authentication. The system shall have identified and authenticated the user The system shall not have authenticated the misuser. The system shall not have authorized the misuser to access the protected resource. 1044

6 The system shall have recorded the access control failure. Related business rules. All the rules to realize a deposit, user data, privileges, etc. Iteration. No iterations. Primary Actor. Cracker and thief. Scope. Instant teller machine. Level. Summary Stakeholders and risks. External damage Technology and data variations. Model of the teller machine. 8. Conclusions Use cases are very good design tool for analyzing functional requirements in an early stage; but, they are not focused in the analysis of non-functional requirements. One of the most important nonfunctional requirements that must be considered in a system is security. Use cases analyze security requirements, they are considered as functional requirements because the user has a direct interaction and the client asked for them, some of them can be access interfaces, security algorithms, etc. Security requirements analyze security issues from a positive and straight forward point of view. They just set what security processes that must have a system, like check user and password; but they do not analyze all the possible negative scenarios that can affect or break the system s security. For analyze security threats, Sindre and Ophal [8] suggest a new extension for the use cases: Misuse Cases. One of the main advantages that they offer is the system analysis from a negative point of view, trying to do exactly what the system does not want. With that, it is possible to see another panorama to protect the system, placing a misactor to play the role of a normal actor who tries to attack the system. Also, there is a tool (Scenario Plus) that already had implemented this technique. It had the possibility to draw the diagram and it creates automatically the links between misuse and use cases through searching for underlined use case names with simple fuzzy matching [3]. But, misuse cases techniques are still in a development stage; there is not enough documentation for a deep analysis, and is not clear how they can be implemented during the other stages of the software design; there is not a clear method to get all the misuse case and a big part of the analysis depends on the designer s criteria. As Sindre and Opdahl suggested: Another important goal for further work is to facilitate broader industrial adoption of misuse cases [8]. They propose, in the same paper, to embed the misuse case in a use case modeling tool and to create a database of standard misuse cases to assist software architects. System stakeholders should create their own misuse case charts for requirements that are specific to their own problem domains. Once developed, a knowledge database can reduce the amount of standard security flaws used by lambda hackers. As said, misuse cases have not been evaluated in practical applications, just in examples. However, the industry could be interested on use them because of the following reasons: Misuse cases are a close approach to use cases; they are using the same terms as in UML use cases diagrams. Standardization of the misuse case as part of the UML notation might allow it to become a mandatory part of project development. It might be useful to create a specific notation for security functionality, or countermeasures that have been added to mitigate vulnerabilities and threats. [21] Security requirements are a main part in new system, especially those oriented to ecommerce. Misuse cases are small, simple and easy to understand. 9. References [1] Ian Alexander, Misuse cases: Use cases with hostile intent, IEEE-Software, vol. 20, no. 1, pp.58-66, [2] Donald G. Firesmith, Security use cases, Journal of Object Technology, vol. 2, no. 3, pp.53-64, [3] Ian F. Alexander, Initial industrial experience of misuse cases in trade-off analysis, In Proceedings of 10th Anniversary IEEE Joint International Conference on Requirements Engineering, pp.61-70,

7 [4] Lin Liu, Eric Yu, John Mylopoulos, Analyzing security requirements as relationships among strategic actors, In Proceedings of 2nd Symposium on Requirements Engineering for Information Security, [5] Paco Hope, Gary McGraw, Annie I. Antón, Misuse and abuse cases: Getting past the positive, IEEE Security and Privacy, vol. 2, no. 3, pp.90-92, [6] Joshua J. Pauli, Dianxiang Xu, Misuse case-based design and analysis of secure software architecture, In Proceedings of International Conference on Informa-tion Technology Coding and Computing, pp , [7] Guttorm Sindre, Andreas L. Opdahl, Templates for misuse case description, In 7th International Workshop on Requirements Engineering: Foundation of Software Quality, pp.4-17, [8] Guttorm Sindre, Andreas L. Opdahl, Eliciting security requirements by misuse cases, Requirements Engineering, vol. 45, pp.34-44, [9] Ian Sommerville, Software Engineering, Addison-Wesley, 6th edition, USA, [10] Munina Yusufu, Gulina Yusufu, Comparison of software specification methods using a case study, In Proceedings of International Conference on Computer Science and Software Engineering, pp , [11] Munina Yusufu, Gulina Yusufu, Comparative study of formal specifications through a case study, In Proceedings of 2nd International Conference on Information Science and Technology, pp , [12] Ivar Jacobson, Magnus Christerson, Patrik Jonsson, and G. Overgaard, Object-Oriented Software Engineering: A Use Case Driven Approach, Boston: Addison-Wesley, USA, [13] Larry L. Constantine, Lucy A. D. Lockwood, Software for Use: A Practical Guide to the Models and Methods of Usage-Centered Design, ACM Press, USA, [14] Alistair Cockburn, Writing Effective Use Cases. Addison-Wesley, USA, [15] James E. Rumbaugh, Getting Started: Using Use Cases to Capture Requirements, Journal of Object-Oriented Programming, vol. 7, no. 5, pp. 8-23, [16] Daryl Kulak, Eamonn Guiney, Use Cases: Requirements in Context, ACM Press, USA, [17] John McDermott, Abuse-Case-Based Assurance Arguments, In Proceedings of 17th Annual Computer Security Applications Conference, pp , [18] Ian F. Alexander, Modeling the Interplay of Conflicting Goals with Use and Misuse Cases, In Proceedings of 8th International Workshop on Requirements Engineering: Foundation for Software Quality, [19] John McDermott, Chris Fox, Using Abuse Case Models for Security Requirements Analysis, In Proceedings of 15th Annual Computer Security Applications Conference, pp ,1999. [20] Laurie Williams, [21] Lillian Røstad, An extended misuse case notation: Including vulnerabilities and the insider threat, In Proceedings of 12th Working Conference on Requirements Engineering: Foundation for Software Quality, [22] Peter Karpati, Guttorm Sindre, Raimundas Matulevicius, Comparing Misuse Case and Mal- Activity Diagrams for Modelling Social Engineering Attacks, International Journal of Secure Software Engineering, Vol. 3, Iss. 2, [23] Saeed Ullah, Muzaffar Iq bal, Aamir Mehmood Khan, A Survey on Issues in Non-Functional Requirements Elicitation, In Proceedings of International Conference on Computer Networks and Information Technology, pp , [24] Li Xin, Zhang Ru, Niu Xinxin, Liu Jianyi, Analysis of the Security for Information Hiding Based on Behavior, AISS: Advances in Information Sciences and Service Sciences, Vol. 4, No. 5, pp , 2012 [25] Muhammad Qaiser Saleem, Jafreezal B. Jaafar, Mohd Fadzil Hassan, Model-based Security Engineering of SOA Systems Using Modified UML-SOA-Sec, AISS: Advances in Information Sciences and Service Sciences, Vol. 4, No. 9, pp ,

Misuse Cases. SE 555 Software Requirements & Specification

Misuse Cases. SE 555 Software Requirements & Specification Misuse Cases 1 Understanding Negative Scenarios A Scenario is a sequence of actions leading to a Goal desired by a stakeholder A Negative Scenario is a scenario whose Goal is desired Not to occur by the

More information

A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems

A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems Sojan Markose, Xiaoqing

More information

A Model Transformation from Misuse Cases to Secure Tropos

A Model Transformation from Misuse Cases to Secure Tropos A Model Transformation from Misuse Cases to Secure Tropos Naved Ahmed 1, Raimundas Matulevičius 1, and Haralambos Mouratidis 2 1 Institute of Computer Science, University of Tartu, Estonia {naved,rma}@ut.ee

More information

Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions

Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions Mohammad Jabed Morshed Chowdhury 1, 2, Raimundas Matulevičius 1, Guttorm Sindre 2, and Peter Karpati 2

More information

Analyzing and Specifying Reusable Security Requirements

Analyzing and Specifying Reusable Security Requirements Analyzing and Specifying Reusable Security Requirements Donald G. Firesmith Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 +1 412 268-6874 dgf@sei.cmu.edu ABSTRACT

More information

Tropos: Security. Agent-Oriented Software Engineering course Laurea Specialistica in Informatica A.A

Tropos: Security. Agent-Oriented Software Engineering course Laurea Specialistica in Informatica A.A Tropos: Security Paolo Giorgini Department of Information and Communication Technology University of Trento - Italy http://www.dit.unitn.it/~pgiorgio Agent-Oriented Software Engineering course Laurea Specialistica

More information

Modeling Alternative Courses in Detailed Use Cases

Modeling Alternative Courses in Detailed Use Cases Modeling Alternative Courses in Detailed Use Cases David Gelperin LiveSpecs Software dave@livespecs.com Abstract Real-life interactions between systems and users entail decisions and alternative courses

More information

Using the Common Criteria to Elicit Security Requirements with Use Cases

Using the Common Criteria to Elicit Security Requirements with Use Cases Using the Common Criteria to Elicit Security Requirements with Use Cases Michael S. Ware John B. Bowles Caroline M. Eastman Fairmont State University University of South Carolina University of South Carolina

More information

Effective Threat Modeling using TAM

Effective Threat Modeling using TAM Effective Threat Modeling using TAM In my blog entry regarding Threat Analysis and Modeling (TAM) tool developed by (Application Consulting and Engineering) ACE, I have watched many more Threat Models

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2002 Vol. 1, no. 4, September-October 2002 Requirements Engineering Donald G. Firesmith, Firesmith

More information

Security Engineering for Software

Security Engineering for Software Security Engineering for Software CS996 CISM Jia An Chen 03/31/04 Current State of Software Security Fundamental lack of planning for security Most security issues come to light only after completion of

More information

Analyzing and Specifying Reusable Security Requirements

Analyzing and Specifying Reusable Security Requirements Analyzing and Specifying Reusable Security Requirements Donald G. Firesmith Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 +1 412 268-6874 dgf@sei.cmu.edu ABSTRACT

More information

Functional Requirements and Use Cases

Functional Requirements and Use Cases Functional Requirements and Use Cases By Ruth Malan, Hewlett-Packard Company, and Dana Bredemeyer, Bredemeyer Consulting, Email: ruth_malan@hp.com and dana@bredemeyer.com Functional Requirements Functional

More information

EXAMINATION [The sum of points equals to 100]

EXAMINATION [The sum of points equals to 100] Student name and surname: Student ID: EXAMINATION [The sum of points equals to 100] PART I: Meeting Scheduling example Description: Electronic meeting Scheduling system helps meeting initiator to schedule

More information

Lecture 8: Goals and Scenarios. Pohl K., Requirements Engineering: Fundamentals, Principles, and Techniques, Springer, 2010, 814p.

Lecture 8: Goals and Scenarios. Pohl K., Requirements Engineering: Fundamentals, Principles, and Techniques, Springer, 2010, 814p. Lecture 8: Goals and Scenarios Pohl K., Requirements Engineering: Fundamentals, Principles, and Techniques, Springer, 2010, 814p. 2 Documenting Goals 3 Documenting Goals 1. Each goal must have a unique

More information

MARCH Secure Software Development WHAT TO CONSIDER

MARCH Secure Software Development WHAT TO CONSIDER MARCH 2017 Secure Software Development WHAT TO CONSIDER Table of Content Introduction... 2 Background... 3 Problem Statement... 3 Considerations... 4 Planning... 4 Start with security in requirements (Abuse

More information

CYSE 411/AIT 681 Secure Software Engineering. Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun

CYSE 411/AIT 681 Secure Software Engineering. Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun CYSE 411/AIT 681 Secure Software Engineering Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun Reading This lecture [McGraw]: Ch. 7-9 2 Seven Touchpoints 1. Code review 2. Architectural

More information

4. Risk-Based Security Testing. Reading. CYSE 411/AIT 681 Secure Software Engineering. Seven Touchpoints. Application of Touchpoints

4. Risk-Based Security Testing. Reading. CYSE 411/AIT 681 Secure Software Engineering. Seven Touchpoints. Application of Touchpoints Reading This lecture [McGraw]: Ch. 7-9 CYSE 411/AIT 681 Secure Software Engineering Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun 2 Seven Touchpoints Application of Touchpoints

More information

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm Insider Threat Program: Protecting the Crown Jewels Monday, March 2, 2:15 pm - 3:15 pm Take Away Identify your critical information Recognize potential insider threats What happens after your critical

More information

Towards the integration of security patterns in UML Component-based Applications

Towards the integration of security patterns in UML Component-based Applications Towards the integration of security patterns in UML Component-based Applications Anas Motii 1, Brahim Hamid 2, Agnès Lanusse 1, Jean-Michel Bruel 2 1 CEA, LIST, Laboratory of Model Driven Engineering for

More information

Modeling Crisis Management System With the Restricted Use Case Modeling Approach

Modeling Crisis Management System With the Restricted Use Case Modeling Approach Modeling Crisis Management System With the Restricted Use Case Modeling Approach Gong Zhang 1, Tao Yue 2, and Shaukat Ali 3 1 School of Computer Science and Engineering, Beihang University, Beijing, China

More information

Using QVT to obtain Use Cases from Secure Business Processes modeled with BPMN

Using QVT to obtain Use Cases from Secure Business Processes modeled with BPMN Using QVT to obtain Use Cases from Secure Business Processes modeled with BPMN Alfonso Rodríguez 1, Eduardo Fernández-Medina 2, and Mario Piattini 2 1 Departamento de Auditoría e Informática, Universidad

More information

Scenarios, Quality Attributes, and Patterns: Capturing and Using their Synergistic Relationships for Product Line Architectures

Scenarios, Quality Attributes, and Patterns: Capturing and Using their Synergistic Relationships for Product Line Architectures Scenarios, Quality Attributes, and Patterns: Capturing and Using their Synergistic Relationships for Product Line Architectures Muhammad Ali Babar National ICT Australia Ltd. and University of New South

More information

Specifying Usability Features with Patterns and Templates

Specifying Usability Features with Patterns and Templates Specifying Usability Features with Patterns and Templates Holger Röder University of Stuttgart Institute of Software Technology Universitätsstraße 38, 70569 Stuttgart, Germany roeder@informatik.uni-stuttgart.de

More information

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010 Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at

More information

Applying Context to Web Authentication

Applying Context to Web Authentication Applying Context to Web Authentication John Linn, Burt Kaliski, and Moti Yung, RSA Laboratories; Magnus Nyström, RSA Security Inc. Prepared for W3C Workshop on Transparency and Usability of Web Authentication,

More information

A Review Paper on Network Security Attacks and Defences

A Review Paper on Network Security Attacks and Defences EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY

More information

Basics : the Requirements Engineering Process

Basics : the Requirements Engineering Process SEG3101 (Fall 2010) Basics : the Requirements Engineering Process Gregor v. Bochmann, University of Ottawa Based on Powerpoint slides prepared by Gunter Mussbacher with material from: Sommerville & Kotonya

More information

University of East London Institutional Repository:

University of East London Institutional Repository: University of East London Institutional Repository: http://roar.uel.ac.uk This conference paper is made available online in accordance with publisher policies. Please scroll down to view the document itself.

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came Victoria Ellsworth Dr. Ping Li ICTN 4040 04/11/17 Internet of Things (IoT) Attacks The Internet of Things (IoT) is based off a larger concept; the Internet of Things came from idea of the Internet of Everything.

More information

An Evaluation of a Use Case Driven Requirements Analysis Using Web UI Prototype Generation Tool

An Evaluation of a Use Case Driven Requirements Analysis Using Web UI Prototype Generation Tool An Evaluation of a Use Case Driven Requirements Analysis Using Web UI Prototype Generation Tool SHINPEI OGATA Function Control System, Graduate School of Engineering Shibaura Institute of Technology 307

More information

Introduction to DBMS DATA DISK. File Systems. DBMS Stands for Data Base Management System. Examples of Information Systems which require a Database:

Introduction to DBMS DATA DISK. File Systems. DBMS Stands for Data Base Management System. Examples of Information Systems which require a Database: 1 Introduction to DBMS DBMS Stands for Data Base Management System It is the collection of interrelated data (Which is called as Database) It contains set of software tools/programs which access the data

More information

Introduction to Software Engineering. 5. Modeling Objects and Classes

Introduction to Software Engineering. 5. Modeling Objects and Classes Introduction to Software Engineering 5. Modeling Objects and Classes Roadmap > UML Overview > Classes, attributes and operations > UML Lines and Arrows > Parameterized Classes, Interfaces and Utilities

More information

ISO/IEC Common Criteria. Threat Categories

ISO/IEC Common Criteria. Threat Categories ISO/IEC 15408 Common Criteria Threat Categories 2005 Bar Biszick-Lockwood / QualityIT Redmond, WA 2003 Purpose This presentation introduces you to the threat categories contained in ISO/IEC 15408, used

More information

Pattern-Based Architectural Design Process Model

Pattern-Based Architectural Design Process Model Pattern-Based Architectural Design Process Model N. Lévy, F. Losavio Abstract: The identification of quality requirements is crucial to develop modern software systems, especially when their underlying

More information

Use Cases: the Pros and Cons

Use Cases: the Pros and Cons Use Cases: the Pros and Cons By Donald G. Firesmith Introduction Over the last three years, use cases have become well established as one of the fundamental techniques of objectoriented analysis. Although

More information

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright Chapter 12 1

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright Chapter 12 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Chapter 12 1 IT Ethics, Impacts, and Security Chapter 12 2 Chapter Outline Ethical Issues Impact

More information

Intelligent Risk Identification and Analysis in IT Network Systems

Intelligent Risk Identification and Analysis in IT Network Systems Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au

More information

A Method for Data Minimization in Personal Information Sharing

A Method for Data Minimization in Personal Information Sharing A Method for Data Minimization in Personal Information Sharing Prima Gustiene and Remigijus Gustas Department of Information Systems, Karlstad University, Sweden {Prima.Gustiene, Remigijus.Gustas}@kau.se

More information

Developing an integrated approach to the analysis of MOD cyber-related risks

Developing an integrated approach to the analysis of MOD cyber-related risks Developing an integrated approach to the analysis of MOD cyber-related risks James Tate, Colette Jeffery Joint Enablers Analysis Group 28 th July 2016 COVERING Overview 1. risk research 2. Customer requirement

More information

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Threat Modeling. Bart De Win Secure Application Development Course, Credits to Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,

More information

BUILDING GOOD-QUALITY FUNCTIONAL SPECIFICATION MODEL

BUILDING GOOD-QUALITY FUNCTIONAL SPECIFICATION MODEL BUILDING GOOD-QUALITY FUNCTIONAL SPECIFICATION MODEL A few words on Samares Engineering Research and Consultancy on Systems Engineering Requirement engineering Model-Based Systems Engineering Co-simulation

More information

Secure Application Development. OWASP September 28, The OWASP Foundation

Secure Application Development. OWASP September 28, The OWASP Foundation Secure Application Development September 28, 2011 Rohini Sulatycki Senior Security Consultant Trustwave rsulatycki@trustwave.com Copyright The Foundation Permission is granted to copy, distribute and/or

More information

Modeling Systems Using Design Patterns

Modeling Systems Using Design Patterns Modeling Systems Using Design Patterns Jaroslav JAKUBÍK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia jakubik@fiit.stuba.sk

More information

Software re-use assessment for quality M. Ramachandran School of Computing and Mathematical Sciences, Jo/m Moores C/mrerszZ?/,

Software re-use assessment for quality M. Ramachandran School of Computing and Mathematical Sciences, Jo/m Moores C/mrerszZ?/, Software re-use assessment for quality M. Ramachandran School of Computing and Mathematical Sciences, Jo/m Moores C/mrerszZ?/, ABSTRACT Reuse of software components can improve software quality and productivity

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

Software Development Methodologies

Software Development Methodologies Software Development Methodologies Lecturer: Raman Ramsin Lecture 3 Seminal Object-Oriented Methodologies: A Feature-Focused Review 1 Responsibility-Driven Design (RDD) Introduced in 1990; a UML-based

More information

A Model for Structuring and Reusing Security Requirements Sources and Security Requirements

A Model for Structuring and Reusing Security Requirements Sources and Security Requirements A Model for Structuring and Reusing Requirements Sources and Requirements Christian Schmitt 1 and Peter Liggesmeyer 2, 3 1 Siemens AG, Siemens Corporate Technology, Otto-Hahn-Ring 6, 81739 Munich, Germany

More information

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE PREPARATION FOR GDPR IS ESSENTIAL The EU GDPR imposes interrelated obligations for organizations handling

More information

Aspects of Enhancing Security in Software Development Life Cycle

Aspects of Enhancing Security in Software Development Life Cycle Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 2 (2017) pp. 203-210 Research India Publications http://www.ripublication.com Aspects of Enhancing Security in Software

More information

STANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange

STANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange STANDARD INFORMATION SHARING FORMATS Will Semple Head of Threat and Vulnerability Management New York Stock Exchange AGENDA Information Sharing from the Practitioner s view Changing the focus from Risk

More information

Human Error Taxonomy

Human Error Taxonomy Human Error Taxonomy The Human Error Taxonomy (HET) provides a structure for requirement errors made during the software development process. The HET can be employed during software inspection to help

More information

Modeling Enterprise Web Applications

Modeling Enterprise Web Applications Modeling Enterprise Web Applications Shane Sendall and Alfred Strohmeier Swiss Federal Institute of Technology Lausanne Department of Computer Science Software Engineering Laboratory 1015 Lausanne EPFL,

More information

Domain Engineering And Variability In The Reuse-Driven Software Engineering Business.

Domain Engineering And Variability In The Reuse-Driven Software Engineering Business. OBM 7 -draft 09/02/00 1 Domain Engineering And Variability In The Reuse-Driven Software Engineering Business. Martin L. Griss, Laboratory Scientist, Hewlett-Packard Laboratories, Palo Alto, CA. Effective

More information

Goal. Introduce the bases used in the remaining of the book. This includes

Goal. Introduce the bases used in the remaining of the book. This includes Fundamentals of Secure System Modelling Springer, 2017 Chapter 1: Introduction Raimundas Matulevičius University of Tartu, Estonia, rma@ut.ee Goal Introduce the bases used in the remaining of the book.

More information

THREAT MODELING IN SOCIAL NETWORKS. Molulaqhooa Maoyi Rotondwa Ratshidaho Sanele Macanda

THREAT MODELING IN SOCIAL NETWORKS. Molulaqhooa Maoyi Rotondwa Ratshidaho Sanele Macanda THREAT MODELING IN SOCIAL NETWORKS Molulaqhooa Maoyi Rotondwa Ratshidaho Sanele Macanda INTRODUCTION Social Networks popular web service. 62% adults worldwide use social media 65% of world top companies

More information

MODULE NO.28: Password Cracking

MODULE NO.28: Password Cracking SUBJECT Paper No. and Title Module No. and Title Module Tag PAPER No. 16: Digital Forensics MODULE No. 28: Password Cracking FSC_P16_M28 TABLE OF CONTENTS 1. Learning Outcomes 2. Introduction 3. Nature

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Threat analysis. Tuomas Aura CS-C3130 Information security. Aalto University, autumn 2017

Threat analysis. Tuomas Aura CS-C3130 Information security. Aalto University, autumn 2017 Threat analysis Tuomas Aura CS-C3130 Information security Aalto University, autumn 2017 Outline What is security Threat analysis Threat modeling example Systematic threat modeling 2 WHAT IS SECURITY 3

More information

Developing an integrated approach to the analysis of MOD cyber-related risks

Developing an integrated approach to the analysis of MOD cyber-related risks Developing an integrated approach to the analysis of MOD cyber-related risks Colette Jeffery, James Tate Defence Science Technology Laboratory COST Expert Judgement Meeting 12 to 14 October 2016 COVERING

More information

Engineering Your Software For Attack

Engineering Your Software For Attack Engineering Your Software For Attack Robert A. Martin Senior Principal Engineer Cyber Security Center Center for National Security The MITRE Corporation 2013 The MITRE Corporation. All rights reserved.

More information

AUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response

AUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response AUTHENTICATION Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response Who we are Eric Scales Mandiant Director IR, Red Team, Strategic Services Scott Koller

More information

Object-Oriented Systems Development: Using the Unified Modeling Language

Object-Oriented Systems Development: Using the Unified Modeling Language Object-Oriented Systems Development: Using the Unified Modeling Language Chapter 4: Object-Oriented Methodologies Goals Object-Oriented Methodologies The Rumbaugh et al. OMT The Booch methodology Jacobson's

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

USE CASE BASED REQUIREMENTS VERIFICATION

USE CASE BASED REQUIREMENTS VERIFICATION USE CASE BASED REQUIREMENTS VERIFICATION Verifying the consistency between use cases and assertions Stéphane S. Somé, Divya K. Nair School of Information Technology and Engineering (SITE), University of

More information

Overview of Information Security

Overview of Information Security Overview of Information Security Lecture By Dr Richard Boateng, UGBS, Ghana Email: richard@pearlrichards.org Original Slides by Elisa Bertino CERIAS and CS &ECE Departments, Pag. 1 and UGBS Outline Information

More information

Restricted Use Case Modeling Approach

Restricted Use Case Modeling Approach RUCM TAO YUE tao@simula.no Simula Research Laboratory Restricted Use Case Modeling Approach User Manual April 2010 Preface Use case modeling is commonly applied to document requirements. Restricted Use

More information

Security Risk Management Domain Model

Security Risk Management Domain Model Lecture 2: Security Modelling Understanding security goals and secure business activities Dr. Raimundas Matulevičius email: rma@ut.ee 1" Security Risk Management Domain Model "2"" Goals and Questions What

More information

Software Engineering: Integration Requirements

Software Engineering: Integration Requirements Software Engineering: Integration Requirements AYAZ ISAZADEH Department of Computer Science Tabriz University Tabriz, IRAN Abstract: - This paper presents a discussion of software integration requirements,

More information

An improved security model for identity authentication against cheque payment fraud in Tanzanian banks

An improved security model for identity authentication against cheque payment fraud in Tanzanian banks An improved security model for identity authentication against cheque payment fraud in Tanzanian banks Feno Heriniaina, R. 1 * Kitindi, Edvin 2 1. College of Computer Science, Chongqing University, Chongqing-

More information

Refinement and Formalization of Semi-Formal Use Case Descriptions

Refinement and Formalization of Semi-Formal Use Case Descriptions Refinement and Formalization of Semi-Formal Use Case Descriptions Matthias Riebisch, Michael Hübner Ilmenau Technical University Max-Planck-Ring 14; 98684 Ilmenau; Germany {matthias.riebisch michael.huebner}@tu-ilmenau.de

More information

C1: Define Security Requirements

C1: Define Security Requirements OWASP Top 10 Proactive Controls IEEE Top 10 Software Security Design Flaws OWASP Top 10 Vulnerabilities Mitigated OWASP Mobile Top 10 Vulnerabilities Mitigated C1: Define Security Requirements A security

More information

Train employees to avoid inadvertent cyber security breaches

Train employees to avoid inadvertent cyber security breaches Train employees to avoid inadvertent cyber security breaches TRAIN EMPLOYEES TO AVOID INADVERTENT CYBER SECURITY BREACHES PAGE 2 How much do you know about cyber security? Small business owners often lack

More information

Insider Threats. Nathalie Baracaldo. School of Information Sciences. March 26 th, 2015

Insider Threats. Nathalie Baracaldo. School of Information Sciences. March 26 th, 2015 Insider Threats Nathalie Baracaldo Ph.D. Candidate date School of Information Sciences March 26 th, 2015 1 Insider Attacks According to CERT insider attackers are defined as: Currently or previously employed

More information

Cyber Security Guide. For Politicians and Political Parties

Cyber Security Guide. For Politicians and Political Parties Cyber Security Guide For Politicians and Political Parties Indian Election Integrity Initiative Design by ccm.design Cover Image by Paul Dufour Helping to Safeguard the Integrity of the Electoral Process

More information

The Cyber War on Small Business

The Cyber War on Small Business The Cyber War on Small Business Dillon Behr Executive Lines Broker Risk Placement Services, Inc. Meet Our Speaker Dillon Behr Executive Lines Broker Risk Placement Services, Inc. Previously worked as Cyber

More information

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United

More information

Software Engineering

Software Engineering Software Engineering A systematic approach to the analysis, design, implementation and maintenance of software. Software Development Method by Jan Pettersen Nytun, page 1 Software Engineering Methods Most

More information

SANS Institute , Author retains full rights.

SANS Institute , Author retains full rights. Steven F Burns GIAC Security Essentials Certification (GSEC) Practical Assignment Version 1.4c Threat Modeling: A Process To Ensure Application Security January 5, 2005 Abstract This paper discusses the

More information

AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES

AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES Vol.5, No.1, pp. 81-90, 2014 doi: 10.7903/ijecs.1040 AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES Daniel J. Buehrer National Chung Cheng University 168 University Rd., Min-Hsiung Township, Chiayi County,

More information

Modeling Issues Modeling Enterprises. Modeling

Modeling Issues Modeling Enterprises. Modeling Modeling Issues Modeling Enterprises SE502: Software Requirements Engineering Modeling Modeling can guide elicitation: It can help you figure out what questions to ask It can help to surface hidden requirements

More information

Architectural Blueprint

Architectural Blueprint IMPORTANT NOTICE TO STUDENTS These slides are NOT to be used as a replacement for student notes. These slides are sometimes vague and incomplete on purpose to spark a class discussion Architectural Blueprint

More information

The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne

The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing R. Paul, W. T. Tsai, Jay Bayne 1 Table of Content Introduction Service-Oriented Computing Acceptance of SOA within DOD Policy-based

More information

Ch 1: The Architecture Business Cycle

Ch 1: The Architecture Business Cycle Ch 1: The Architecture Business Cycle For decades, software designers have been taught to build systems based exclusively on the technical requirements. Software architecture encompasses the structures

More information

Authentication Methods

Authentication Methods CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks

More information

- Table of Contents -

- Table of Contents - - Table of Contents - 1 INTRODUCTION... 1 1.1 OBJECTIVES OF THIS GUIDE... 1 1.2 ORGANIZATION OF THIS GUIDE... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 5 2 BASIC KNOWLEDGE

More information

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT NOTICE Clients are responsible for ensuring their own compliance with various laws and regulations, including the

More information

Global Reference Architecture: Overview of National Standards. Michael Jacobson, SEARCH Diane Graski, NCSC Oct. 3, 2013 Arizona ewarrants

Global Reference Architecture: Overview of National Standards. Michael Jacobson, SEARCH Diane Graski, NCSC Oct. 3, 2013 Arizona ewarrants Global Reference Architecture: Overview of National Standards Michael Jacobson, SEARCH Diane Graski, NCSC Oct. 3, 2013 Arizona ewarrants Goals for this Presentation Define the Global Reference Architecture

More information

What is ISO ISMS? Business Beam

What is ISO ISMS? Business Beam 1 Business Beam Contents 2 Your Information is your Asset! The need for Information Security? About ISO 27001 ISMS Benefits of ISO 27001 ISMS 3 Your information is your asset! Information is an Asset 4

More information

OWASP Top 10 The Ten Most Critical Web Application Security Risks

OWASP Top 10 The Ten Most Critical Web Application Security Risks OWASP Top 10 The Ten Most Critical Web Application Security Risks The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Chapter 12. UML and Patterns. Copyright 2008 Pearson Addison-Wesley. All rights reserved

Chapter 12. UML and Patterns. Copyright 2008 Pearson Addison-Wesley. All rights reserved Chapter 12 UML and Patterns Copyright 2008 Pearson Addison-Wesley. All rights reserved Introduction to UML and Patterns UML and patterns are two software design tools that can be used within the context

More information

1. INTRODUCTION 2. PROPOSED SYSTEM. Parashar Sangle, IJECS Volume 05 Issue 12 Dec., 2016 Page No Page 19489

1. INTRODUCTION 2. PROPOSED SYSTEM. Parashar Sangle, IJECS Volume 05 Issue 12 Dec., 2016 Page No Page 19489 www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issue 12 Dec. 2016, Page No. 19489-19493 Data Security System in Cloud by Using Fog Computing and Data Mining

More information

On UML2.0 s Abandonment of the Actors-Call-Use-Cases Conjecture

On UML2.0 s Abandonment of the Actors-Call-Use-Cases Conjecture On UML2.0 s Abandonment of the Actors-Call-Use-Cases Conjecture Sadahiro Isoda Toyohashi University of Technology Toyohashi 441-8580, Japan isoda@tutkie.tut.ac.jp Abstract. UML2.0 recently made a correction

More information

1. i. What are the 3 major components of a information system and show their relationship input output

1. i. What are the 3 major components of a information system and show their relationship input output Higher National Diploma in Information Technology First Year, Second semesterexamination-2011 IT2005: System Analysis and Design Answer Script No. of pages: 11 1. i. What are the 3 major components of

More information

Countering the Insider Threat: Behavioral Analytics Security Intelligence Cell (BASIC)

Countering the Insider Threat: Behavioral Analytics Security Intelligence Cell (BASIC) Countering the Insider Threat: Behavioral Analytics Security Intelligence Cell (BASIC) Jesse Hughes CSG LLP Tammy Torbert Solution Architect, HP ESP In the next 35 minutes we ll cover the following: The

More information

Student name and surname: Student ID: EXAMINATION

Student name and surname: Student ID: EXAMINATION Student name and surname: Student ID: EXAMINATION The exam is open-book, open-laptop, and open-internet. You are not allowed to share information with anyone during the exam other than the lecturer. You

More information

Apex Information Security Policy

Apex Information Security Policy Apex Information Security Policy Table of Contents Sr.No Contents Page No 1. Objective 4 2. Policy 4 3. Scope 4 4. Approval Authority 5 5. Purpose 5 6. General Guidelines 7 7. Sub policies exist for 8

More information

Advanced Security Tester Course Outline

Advanced Security Tester Course Outline Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,

More information