SYSTEMATIC SECURE DESIGN GUIDELINE TO IMPROVE INTEGRITY AND AVAILABILITY OF SYSTEM SECURITY ASHVINI DEVI A/P KRISHNAN

Similar documents
ENHANCEMENT OF UML-BASED WEB ENGINEERING FOR METAMODELS: HOMEPAGE DEVELOPMENT CASESTUDY KARZAN WAKIL SAID

SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA

HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP

AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI

SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED

OPTIMIZE PERCEPTUALITY OF DIGITAL IMAGE FROM ENCRYPTION BASED ON QUADTREE HUSSEIN A. HUSSEIN

PRIVACY FRIENDLY DETECTION TECHNIQUE OF SYBIL ATTACK IN VEHICULAR AD HOC NETWORK (VANET) SEYED MOHAMMAD CHERAGHI

OPTIMIZED BURST ASSEMBLY ALGORITHM FOR MULTI-RANKED TRAFFIC OVER OPTICAL BURST SWITCHING NETWORK OLA MAALI MOUSTAFA AHMED SAIFELDEEN

BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG UNIVERSITI TEKNOLOGI MALAYSIA

IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM

SEMANTICS ORIENTED APPROACH FOR IMAGE RETRIEVAL IN LOW COMPLEX SCENES WANG HUI HUI

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI

A TRUST MODEL FOR BUSINESS TO CUSTOMER CLOUD E-COMMERCE HOSSEIN POURTAHERI

THE COMPARISON OF IMAGE MANIFOLD METHOD AND VOLUME ESTIMATION METHOD IN CONSTRUCTING 3D BRAIN TUMOR IMAGE

LINK QUALITY AWARE ROUTING ALGORITHM IN MOBILE WIRELESS SENSOR NETWORKS RIBWAR BAKHTYAR IBRAHIM UNIVERSITI TEKNOLOGI MALAYSIA

HARDWARE AND SOFTWARE CO-SIMULATION PLATFORM FOR CONVOLUTION OR CORRELATION BASED IMAGE PROCESSING ALGORITHMS SAYED OMID AYAT

PERFOMANCE ANALYSIS OF SEAMLESS VERTICAL HANDOVER IN 4G NETWOKS MOHAMED ABDINUR SAHAL

IMPROVED IMAGE COMPRESSION SCHEME USING HYBRID OF DISCRETE FOURIER, WAVELETS AND COSINE TRANSFORMATION MOH DALI MOUSTAFA ALSAYYH

HARDWARE-ACCELERATED LOCALIZATION FOR AUTOMATED LICENSE PLATE RECOGNITION SYSTEM CHIN TECK LOONG UNIVERSITI TEKNOLOGI MALAYSIA

ISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN

CLOUD COMPUTING ADOPTION IN BANKING SYSTEM (UTM) IN TERMS OF CUSTOMERS PERSPECTIVES SHAHLA ASADI

ONTOLOGY-BASED SEMANTIC HETEROGENEOUS DATA INTEGRATION FRAMEWORK FOR LEARNING ENVIRONMENT

A SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE TELECONFERENCING VAHIDREZA KHOUBIARI

ENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI

COLOUR IMAGE WATERMARKING USING DISCRETE COSINE TRANSFORM AND TWO-LEVEL SINGULAR VALUE DECOMPOSITION BOKAN OMAR ALI

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF IDENTITY- BASED AUTHENTICATION IN WIRELESS SENSOR NETWORKS MIR ALI REZAZADEH BAEE

LOCALIZING NON-IDEAL IRISES VIA CHAN-VESE MODEL AND VARIATIONAL LEVEL SET OF ACTIVE CONTOURS WITHTOUT RE- INITIALIZATION QADIR KAMAL MOHAMMED ALI

INTEGRATION OF CUBIC MOTION AND VEHICLE DYNAMIC FOR YAW TRAJECTORY MOHD FIRDAUS BIN MAT GHANI

DYNAMIC TIMESLOT ALLOCATION TECHNIQUE FOR WIRELESS SENSOR NETWORK OON ERIXNO

DYNAMIC MOBILE SERVER FOR LIVE CASTING APPLICATIONS MUHAMMAD SAZALI BIN HISHAM UNIVERSITI TEKNOLOGI MALAYSIA

TRUSTED CLOUD COMPUTING FRAMEWORK IN CRITICAL INDUSTRIAL APPLICATION MERVAT ADIB BAMIAH UNIVERSITI TEKNOLOGI MALAYSIA

LOGICAL OPERATORS AND ITS APPLICATION IN DETERMINING VULNERABLE WEBSITES CAUSED BY SQL INJECTION AMONG UTM FACULTY WEBSITES NURUL FARIHA BINTI MOKHTER

This item is protected by original copyright

A NEW STEGANOGRAPHY TECHNIQUE USING MAGIC SQUARE MATRIX AND AFFINE CIPHER WALEED S. HASAN AL-HASAN UNIVERSITI TEKNOLOGI MALAYSIA

A LEVY FLIGHT PARTICLE SWARM OPTIMIZER FOR MACHINING PERFORMANCES OPTIMIZATION ANIS FARHAN BINTI KAMARUZAMAN UNIVERSITI TEKNOLOGI MALAYSIA

VIRTUAL PRIVATE NETWORK: ARCHITECTURE AND IMPLEMENTATIONS

MULTICHANNEL ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING -ROF FOR WIRELESS ACCESS NETWORK MOHD JIMMY BIN ISMAIL

HIGH SPEED SIX OPERANDS 16-BITS CARRY SAVE ADDER AWATIF BINTI HASHIM

AUTOMATIC APPLICATION PROGRAMMING INTERFACE FOR MULTI HOP WIRELESS FIDELITY WIRELESS SENSOR NETWORK

PROBLEMS ASSOCIATED WITH EVALUATION OF EXTENSION OF TIME (EOT) CLAIM IN GOVERNMENT PROJECTS

Signature :.~... Name of supervisor :.. ~NA.lf... l.?.~mk.. :... 4./qD F. Universiti Teknikal Malaysia Melaka

ARM PROCESSOR EMULATOR MOHAMAD HASRUZAIRIN B MOHD HASHIM

ENHANCING WEB SERVICE SELECTION USING ENHANCED FILTERING MODEL AJAO, TAJUDEEN ADEYEMI

AMBA AXI BUS TO NETWORK-ON-CHIP BRIDGE NG KENG YOKE UNIVERSITI TEKNOLOGI MALAYSIA

DATASET GENERATION AND NETWORK INTRUSION DETECTION BASED ON FLOW-LEVEL INFORMATION AHMED ABDALLA MOHAMEDALI ABDALLA

STUDY OF FLOATING BODIES IN WAVE BY USING SMOOTHED PARTICLE HYDRODYNAMICS (SPH) HA CHEUN YUEN UNIVERSITI TEKNOLOGI MALAYSIA

RECOGNITION OF PARTIALLY OCCLUDED OBJECTS IN 2D IMAGES ALMUASHI MOHAMMED ALI UNIVERSITI TEKNOLOGI MALAYSIA

MODELLING AND REASONING OF LARGE SCALE FUZZY PETRI NET USING INFERENCE PATH AND BIDIRECTIONAL METHODS ZHOU KAIQING

ENHANCING SRAM PERFORMANCE OF COMMON GATE FINFET BY USING CONTROLLABLE INDEPENDENT DOUBLE GATES CHONG CHUNG KEONG UNIVERSITI TEKNOLOGI MALAYSIA

ADAPTIVE ONLINE FAULT DETECTION ON NETWORK-ON-CHIP BASED ON PACKET LOGGING MECHANISM LOO LING KIM UNIVERSITI TEKNOLOGI MALAYSIA

FUZZY NEURAL NETWORKS WITH GENETIC ALGORITHM-BASED LEARNING METHOD M. REZA MASHINCHI UNIVERSITI TEKNOLOGI MALAYSIA

BORANG PENGESAHAN STATUS TESIS


MICRO-SEQUENCER BASED CONTROL UNIT DESIGN FOR A CENTRAL PROCESSING UNIT TAN CHANG HAI

UNIVERSITI SAINS MALAYSIA. CMT322/CMM323 Web Engineering & Technologies [Kejuruteraan & Teknologi Web]

CAMERA CALIBRATION FOR UNMANNED AERIAL VEHICLE MAPPING AHMAD RAZALI BIN YUSOFF

PANDUAN PENGGUNA (PENTADBIR SYSTEM/SYSTEM ADMINISTRATOR) (INFOTECH, BPPF DAN POLIS

HYBRID MEDIUM ACCESS CONTROL USING TOKEN APPROACH IN WIRELESS SENSOR NETWORK FOR HIGH TRAFFIC APPLICATIONS NOR SYAHIDATUL NADIAH BINTI ISMAIL

SLANTING EDGE METHOD FOR MODULATION TRANSFER FUNCTION COMPUTATION OF X-RAY SYSTEM FARHANK SABER BRAIM UNIVERSITI TEKNOLOGI MALAYSIA

UNIVERSITI PUTRA MALAYSIA

ANOMALY DETECTION IN WIRELESS SENSOR NETWORK (WSN) LAU WAI FAN

ADAPTIVE LOOK-AHEAD ROUTING FOR LOW LATENCY NETWORK ON-CHIP NADERA NAJIB QAID AL AREQI UNIVERSITI TEKNOLOGI MALAYSIA

HERMAN. A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science)

THREE BIT SUBTRACTION CIRCUIT VIA FIELD PROGRAMMABLE GATE ARRAY (FPGA) NOORAISYAH BINTI ARASID B

AN ENHANCED SIMULATED ANNEALING APPROACH FOR CYLINDRICAL, RECTANGULAR MESH, AND SEMI-DIAGONAL TORUS NETWORK TOPOLOGIES NORAZIAH BINTI ADZHAR

DEVELOPMENT OF SPAKE S MAINTENANCE MODULE FOR MINISTRY OF DEFENCE MALAYSIA SYED ARDI BIN SYED YAHYA KAMAL UNIVERSITI TEKNOLOGI MALAYSIA

Panduan Guru Maker UNO/ Arduino

HOME APPLIANCE CONTROL SYSTEM TAN WEI SYE

PANDUAN PENGGUNA (PENSYARAH)

FINITE ELEMENT INVESTIGATION ON THE STRENGTH OF SEMI-RIGID EXTENDED END PLATE STEEL CONNECTION USING LUSAS SOFTWARE MOHD MAIZIZ BIN FISHOL HAMDI

Signature : IHSAN BIN AHMAD ZUBIR. Date : 30 November 2007

B,8 PERKHIDMATAN KREDIT DAN PERBANKAN. Pemindahan Data PROSEDUR UNIT KOMPUTER. BPKP/KlOK-117 Bilangan Semakan : 0 Tarikh : PERUBAHAN.


MAC PROTOCOL FOR WIRELESS COGNITIVE NETWORK FARAH NAJWA BINTI MOKHTAR

AN INTEGRATED SERVICE ARCHITECTURE FRAMEWORK FOR INFORMATION TECHNOLOGY SERVICE MANAGEMENT AND ENTERPRISE ARCHITECTURE

PORTABLE ELECTRONICS QUEUE CONTROL SYSTEM WONG CHUN YUAN UNIVERSITY MALAYSIA PAHANG

MAGNETIC FLUX LEAKAGE SYSTEM FOR WIRE ROPE INSPECTION USING BLUETOOTH COMMUNICATION MUHAMMAD MAHFUZ BIN SALEHHON UNIVERSITI TEKNOLOGI MALAYSIA

LINKING ITIL WITH OUTSOURCE SERVICES ROKHSAREH MOBARHAN UNIVERSITI TEKNOLOGI MALAYSIA

1. Threats bermaksud ancaman, atau lebih dikenali sebagai malware (malicious

FAKULTI TEKNOLOGI & SAINS MAKLUMAT

FAKULTI TEKNOLOGI & SAINS MAKLUMAT. PROGRAM KELAYAKAN MASUK SENARAI KURSUS Sarjana Sistem Maklumat

FINGERPRINT DATABASE NUR AMIRA BINTI ARIFFIN THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING)

RGB COLOR IMAGE WATERMARKING USING DISCRETE WAVELET TRANSFORM DWT TECHNIQUE AND 4-BITS PLAN BY HISTOGRAM STRETCHING KARRAR ABDUL AMEER KADHIM

SOLUTION AND INTERPOLATION OF ONE-DIMENSIONAL HEAT EQUATION BY USING CRANK-NICOLSON, CUBIC SPLINE AND CUBIC B-SPLINE WAN KHADIJAH BINTI WAN SULAIMAN

DEVELOPMENT OF VENDING MACHINE WITH PREPAID PAYMENT METHOD AMAR SAFUAN BIN ALYUSI

Pengenalan Sistem Maklumat Dalam Pendidikan

ISU DAN CABARAN PELAKSANAAN SISTEM PENGURUSAN KESELAMATAN MAKLUMAT (ISMS) 15 Jun 2016 Dewan Taklimat Serdang

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

THESIS PROJECT ARCHIVE SYSTEM (T-PAS) SHAHRUL NAZMI BIN ISMAIL

IMPROVED IMPLEMENTATION OF DIGITAL WATERMARKING TECHNIQUES AHMED SABEEH YOUSIF UNIVERSITI TEKNOLOGI MALAYSIA

Panduan Pengguna Autodesk Education Community

PERFORMANCE EVALUATION OF LEACH PROTOCOL FOR WIRELESS SENSOR NETWORKS USING NS2 MUHAMAD FAIZ BIN RAMDZAN

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

RESOURCE ALLOCATION SCHEME FOR FUTURE USER-CENTRIC WIRELESS NETWORK WAHEEDA JABBAR UNIVERSITI TEKNOLOGI MALAYSIA

IRIS RECOGNITION SYSTEM USING HISTOGRAM ANALYSIS NORHUDA BINTI OTHMAN

UNIVERSITI PUTRA MALAYSIA MULTI-LEVEL MOBILE CACHE CONSISTENCY SCHEMES BASED ON APPLICATION REQUIREMENTS DOHA ELSHARIEF MAHMOUD YAGOUB

Pengguna akan diberikan Username dan Password oleh Administrator untuk login sebagai admin/conference Manager bagi conference yang akan diadakan.

SISTEM KOMUNIKASI BERDASARKAN ALGORITMA PENYULITAN AES

COMBINING TABLES. Akademi Audit Negara. CAATs ASAS ACL / 1

ssk 2023 asas komunikasi dan rangkaian TOPIK 4.0 PENGALAMATAN RANGKAIAN Minggu 11

Transcription:

iii SYSTEMATIC SECURE DESIGN GUIDELINE TO IMPROVE INTEGRITY AND AVAILABILITY OF SYSTEM SECURITY ASHVINI DEVI A/P KRISHNAN A dissertation submitted in partial fulfillment of the requirements for the award of the degree of Master of Science (Computer Science) Faculty of Computing Universiti Teknologi Malaysia OCTOBER 2013

iv I declare that this dissertation entitled Systematic Secure Design Guideline To Improve Integrity And Availability Of System Security is the result of my own research except as cited in the references. The dissertation has not been accepted for any degree and is not concurrently submitted in candidature of any other degree. Signature :... Name : Ashvini Devi A/P Krishnan Date : October 18, 2013

v This dissertation is dedicated especially to my beloved mother, Mrs. Gunasundari and father, Mr. Krishnan and also not forgetting my beloved siblings for their endless supports and encouragements.

vi ACKNOWLEDGEMENT First and foremost, I would like to express my utmost gratitude to God for endless blessings and given me strength to during the development of this research until it has completed. I am also heartily grateful and thankful to my supervisor Dr. Dayang Norhayati Abang Jawawi for her constant supports during my study at UTM. She has inspired me greatly to work in this Dissertation. Her motivations and guidance have contributed tremendously in completing the research. I have learned a lot from her and I am fortunate to have her as my mentor and supervisor. Besides, I would like to thank the authority of Universiti Technologi Malaysia (UTM) for providing me with a good environment and facilities during my stay in UTM.

vii ABSTRACT Security is the most important dimension to the systems that involves processing and interchange of confidential information. Therefore it is a must to be designed so that they achieved a high level at security. Security specification languages can be used to represent security specification such as attack specification or to be more precise about who can do what and when, and this can be achieved by enforcing access control. The suitable approach to enforce access control is Role- Based Access Control (RBAC). Only secureuml metamodel is using RBAC as security mechanism. However, secureuml metamodel does not indicate the properties of supporting basic security requirements which focusing on integrity and availability, and even the consideration of situation that leads to different possible attacks. The objective of this dissertation is to propose a systematic secure design guideline by enhancing secureuml metamodel. The enhancement is performed by integrating with protection-levels of secured layers which provides protection for the critical assets in various layers to support integrity and availability and to identify possible internal threats based on scenario by using Step-by-Step Secure Design Guideline (3SDG). In order to use the enhanced secureuml metamodel for designing a secure system, it needs to follow 3SDG to identify and validate system process. 3SDG is a guideline which is formed by integrating Comprehensive, Lightweight Application Security Process (CLASP) design steps and Sommerville s security guideline which most suitable design guideline. Both guidelines are mainly focuses on designing secure system. By using the enhanced secureuml metamodel with 3SDG in a case study, it ables to show the solution for selected internal threats to improve integrity and Availability. This will help security designer provide protection to the computer which the system runs, application and records from threats. This model and the guideline will able to help to design more persistence secure system to maintain security from internal attacks.

viii ABSTRAK Keselamatan adalah dimensi yang paling penting untuk sistem yang melibatkan pemprosesan dan pertukaran maklumat sulit. Oleh itu, ia adalah satu kemestian untuk direka supaya ia mencapai tahap yang tinggi pada keselamatan. Keselamatan bahasa spesifikasi boleh digunakan untuk mewakili spesifikasi keselamatan seperti serangan spesifikasi atau lebih tepat tentang siapa yang boleh melakukan apa dan bila, dan ini boleh dicapai dengan mengekuatkuasakan kawalan masuk. Pendekatan yang sesuai untuk menguatkuasakan kawalan masuk adalah Kawalan Masuk Berasaskan Peranan (RBAC). Hanya metamodel secureuml menggunakan RBAC sebagai mekanisma keselamatan. Walaubagaimana pun, metamodel secureuml tidak menunjukkan sifat-sifat yang menyokong keperluan keselamatan asas yang memberi tumpuan kepada Integriti dan Kebolehsediaan, dan juga pertimbangan keadaan yang membawa kepada kemungkinan serangan yang berbeza. Objektif disertasi ini adalah untuk mencadangkan satu garis panduan reka bentuk sistematik yang selamat dengan meningkatkan metamodel secureuml. Ini adalah untuk meningkatkan prestasi dengan mengintegrasikannya dengan Perlindungan-Tahap Lapisan Bersekuriti yang menyediakan perlindungan bagi aset yang penting dalam pelbagai lapisan untuk menyokong Integriti dan Kebolehsediaan dan untuk mengenal pasti ancaman dalaman yang mungkin berdasarkan senario dengan menggunakan Langkah-demi-Langkah Panduan Rekabentuk Selamat (3SDG). Untuk menggunakan metamodel secureuml yang dipertingkatkan untuk mereka bentuk sistem yang selamat, ia perlu mengikuti 3SDG untuk mengenal pasti dan mengesahkan proses sistem. 3SDG adalah satu garis panduan yang dibentuk dengan mengintegrasikan Komprehensif, Proses Keselamatan Aplikasi Ringan (CLASP) Langkah Rekabentuk dan Garis Panduan Keselamatan oleh Sommerville adalah garis panduan rekabentuk yang paling sesuai. Kedua-dua garis panduan ini terutamanya, memberi tumpuan kepada rekabentuk sistem yang selamat. Dengan menggunakan metamodel secureuml yang dipertingkatkan dengan 3SDG dalam Kajian Kes, dapat menunjukkan penyelesaian bagi ancaman dalaman terpilih untuk peningkatan Integriti dan Kebolehsediaan. Ini akan dapat membantu pereka keselamatan menyediakan perlindungan kepada komputer yang sistem beroperasi, aplikasi dan rekod dari ancaman. Model dan garis panduan ini juga akan dapat membantu rekabentuk sistem untuk mengekalkan sistem yang lebih selamat bagi menyenggara keselamatan daripada serangan dalaman.

ix TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION DEDICATION ACKNOWLEDGMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS LIST OF APPENDICES ii iii iv v vi vii xi xiii xv xvii 1 INTRODUCTION 1.1 Introduction 1 1.2 Problem Background 3 1.3 Problem Statement 8 1.4 Research Aim 9 1.5 Research Objectives 10 1.6 Research Scope 10 1.7 Significance of Study 11 2 LITERATURE REVIEW 2.1 Introduction 12 2.2 Overview Of Security 12 2.2.1 Characteristics of System Security 14

x 2.3 Overview Of Threats 15 2.3.1 Classification of Threats 16 2.3.2 Internal and External Threats 17 2.4 Software Design 18 2.4.1 Unified Modeling Language 18 2.4.2 Significance of Secure Design 19 2.4.3 Secure Layered Architecture 21 2.5 Secure Software Design 22 2.5.1 Secure Design Languages 23 2.5.2 Security Specification Languages 23 2.5.3 Comprehensive Comparison of Existing Security Specification Languages 27 2.5.4 Compulsory Requirements for a Security Requirements Specification Language 27 2.5.5 Similarity with Software Specification Languages 28 2.5.6 Secure Design Guidelines 28 2.5.6.1 Sommerville s Security Guideline 33 2.5.6.2 The Comprehensive, Lightweight Application Security Process (CLASP) 37 2.6 Security Specification Language for Secure Design 38 2.6.1 Misuse Case 38 2.6.2 SecureUML 40 2.6.2.1 SecureUML Metamodel 41 2.6.2.2 Benefits Of Using SecureUML 42 2.6.2.3 SecureUML Design Steps 43 2.6.2.4 Access Control 43 2.6.2.5 The Purpose And Fundamentals Of Access Control 44 2.7 Architectural Design Act as Security Classification Model 45 2.7.1 Role-Based Access Control 50 2.8 Security Concern In Software Development Life Cycle (SDLC) 51 2.9 Related Work 55 2.10 Summary 58 3 METHODOLOGY

xi 3.1 Introduction 59 3.2 Research Process Flow Chart 59 3.3 Conceptual Model 63 3.4 Summary 65 4 ANALYSIS ON INTERGRATION OF PROTECTION LEVEL OF SECURE LAYERS INTO SECUREUML 4.1 Introduction 66 4.2 Integrity And Availability 68 4.3 Affect of Threats towards Integrity and Availability 68 4.3.1 System Security Decision 69 4.3.2 Types of Threats 70 4.3.2.1 Correlation of Threats According CIA 71 4.4 Process of Assimilating Protection-Levels Of Secure Layers Into SecureUML Metamodel 77 4.5 Analyze And Compare Of Protection-Levels Of Secure Layers 79 4.6 Analyze On The Components Of SecureUML Metamodel 81 4.7 The Similarity Between Misuse Cases, SecureUML Secure Layers And Security Policy 82 4.7.1 Mapping Each Protection-Levels Into SecureUML Metamodel Components 84 4.8 Integration of Protection-Levels into SecureUML Metamodel 87 4.8.1 Process of Improving Initial SecureUML Metamodel 88 4.8.2 Stereotypes 90 4.8.2.1 Creation of Access Control Stereotypes 91 4.9 Analysis of Integrated SecureUML Metamodel with Protection-Levels 92 5 EVALUATION ON STEP-BY-STEP SECURE DESIGN GUIDELINE (3SDG) 5.1 Introduction 94 5.2 Workflow To Produce Step-By-Step Secure Design Guideline (3SDG) 96 5.2.1 Choosing Suitable List Of Guidelines For Secure Design 96 5.2.2 Analyze Clasp Design Steps With Chosen Somerville s Guidelines 99

xii 5.3 Production Of Step-By-Step Secure Design Guideline (3SDG) 101 5.4 Evaluate The Step-By-Step Secure Design Guideline (3SDG) On Case Study 103 5.4.1 Case Study: Meeting Scheduler 103 5.4.2 Application 3SDG On Meeting Scheduler System 107 5.5 Enhance the Integrated SecureUML Metamodel with Protection-Levels using 3SDG 118 5.6 Discussion on the Comparison between Initial Case Study and Proposed Enhanced SecureUML with 3SDG 124 6 CONCLUSION AND FUTURE WORK 6.1 Introduction 127 6.2 Research Conclusion 127 6.3 Contribution 130 6.3.1 Point Of Body Of Knowledge 130 6.3.2 Practitioners View 131 6.4 Future Work 131 REFERENCES 132