nov_2016
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
nov_2016 [2017/04/21 18:00] – created silvio.biagioni@unitn.it | nov_2016 [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== How difficult is the CVSS Environmental Metrics ? An Experiment ====== | ====== How difficult is the CVSS Environmental Metrics ? An Experiment ====== | ||
- | Among the [[research_activities|research topics]] | ||
- | * Methodology for Early Requirements | + | This page provides additional resources that enable replication of our experiment |
- | * Compliance | + | |
- | * Security under Evolution | + | |
- | ===== Compliance with Regulations ===== | + | ==== Goal ==== |
+ | The goal of our study is to investigate the discrepancy between CVSS Environmental metrics for environmental vulnerability assessment and their dificulty in practice. We find that vulnerability assessment using CVSS Environmental metrics do not scale well with complexity in spite of the fact that we only considered security requirements and let alone any technical configuration. Specifically, | ||
- | The approach started from the Toronto i* goal modelling language which included the notions | + | ===== Context |
- | mitigation. With these concepts we could capture legal and compliance requirements, | + | |
- | The figure below from a multidisciplinary journal paper with SAP Researchers, | + | ==== Subjects ==== |
+ | The experiment was conducted at the University of Trento in November 2016 as part of the Cyber Security Risk Assessment course. The participants were 29 MSc students in Computer Science. | ||
+ | The experiment took place in a single computer laboratory. The experiment was presented as a laboratory activity and only the high-level | ||
- | ===== Evolving Security Requirements ===== | + | ==== Application Scenarios |
+ | To test the effectiveness of the CVSS guidance we considered two scenarios (flat and segmented networks) and how their environmental metrics should change after security metrics are deployed. In our study we used two scenarios described in the "PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance" | ||
- | Requirements evolution are unavoidable for any life-long system due to changes | + | ==== Supplement Materials ==== |
- | in business objectives, regulations, | + | Here are the materials |
- | cases, these changes | + | |
- | discussion in a standard body might feature two or three proposals, albeit | + | |
- | might not be clear which one will finally win. A possible solution to the | + | |
- | challenges of requirements evolution is to choose a good design alternative | + | |
- | that could still work when evolution happens to minimize the risk and maximize | + | |
- | the benefit. | + | |
- | While many approaches have been proposed to perform the management or | + | * Flat Network Description |
- | consistency checking on requirements evolution, there has been less effort on | + | * Segmented Network Description |
- | delivering an explicit modeling and reasoning framework to assist decision | + | |
- | managers select a good design alternative. | + | |
- | Loucopoulous and Kavakli [[http:// | + | |
- | knowledge about //" | + | |
- | to-be is in the future"//, | + | |
- | future state. In this respect it is important to provide a sound quantitative | + | |
- | analysis, which is one of the current weaknesses identified by Dalal et al. | + | |
- | [[http:// | + | |
- | + | ||
- | We are working on a generic approach which tackles the | + | |
- | fundamental issue of modeling and reasoning about requirements evolution to aid | + | |
- | such decision making. The modeling support represents requirements evolution in | + | |
- | terms of controllable and observable rules in which probability estimates can | + | |
- | be accounted by using game-theoretic semantics. The reasoning support provides | + | |
- | three quantitative metrics to identify which requirements must be implemented | + | |
- | to guarantee the best chances of success (Max Belief) or minimize the risk of | + | |
- | wasting money (Deferral Risk and Max Disbelief). | + | |
- | + | ||
- | ===== People ===== | + | |
- | The following is a list of people that has been involved in the project at some point in time. | + | |
- | * Yudis Asnar | + | |
- | * [[http:// | + | |
- | * [[http:// | + | |
- | * Stephan Neuhaus | + | |
- | * Federica Paci | + | |
- | * Nicola Zannone | + | |
- | + | ||
- | ===== Projects ===== | + | |
- | + | ||
- | This activity was supported by a number of project | + | |
- | + | ||
- | * SecureChange | + | |
- | * MASTER | + | |
- | * SERENITY | + | |
- | + | ||
- | ===== Publications ===== | + | |
- | + | ||
- | ==== 2013 ==== | + | |
- | * Tran L.M.S and Massacci F.: UNICORN: A Tool for Modeling and Reasoning on the Uncertainty of Requirements Evolutions. In: //CAiSE 2013 - Forum// {{: | + | |
- | * Tran L.M.S.: Early Dealing with Evolving Risks in Software Systems. In: //The 3rd International Workshop on Information Systems Security Engineering (WISSE' | + | |
- | + | ||
- | ==== 2012 ==== | + | |
- | + | ||
- | * Massacci F., Nagaraj D., Paci F., Tran L.M.S, Tedeschi, A. Assessing a Requirements Evolution Approach: Empirical Studies in the Air Traffic Management Domain. In Proceedings of International Workshop on Empirical Requirements Engineering (EmpiRE), 49--56, 2012.{{research_activities: | + | |
- | * Paci F., Massacci F., Bouquet F., Debricon, S.Managing Evolution by Orchestrating Requirements and Testing Engineering Processes. In Proceedings of the Third International Workshop on Security Testing (SecTest), 834--841, 2012.{{sectest2012-paci.pdf|PDF}} | + | |
- | + | ||
- | ==== 2011 ==== | + | |
- | * Asnar, Y., Li, T., Massacci, F., Paci, F. Computer Aided Threat Identification. In Proceedings of the IEEE Conference on Commerce and Enterprise Computing (CEC), 145--52, 2011.{{cec.pdf|PDF}} | + | |
- | * Felix, E., Delande, O., Massacci, F., Paci, F. Managing Changes with Legacy Security Engineering Processes.In Proceedings of the IEEE Intelligence and Security Informatics Conference (ISI), 137--142, 2011.{{isi.pdf|PDF}} | + | |
- | * Bergmann, G., Massacci, F., Paci, F., Tun, T.T, Varro, D., Yu, Y. SeCMER: A Tool to Gain Control over Security | + | |
- | | + | |
- | * Massacci, F., Mylopoulos, J., Paci, f.,Tun, T.T, Yu, Y. An extended Ontology for Security Requirements.In Proceedings of The First International Workshop on Information Systems Security Engineering (WISSE), 622--636, 2011.{{wisse-cameraready-paper7.pdf|PDF}} | + | |
- | * F. Massacci and N. Zannone. Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. In Social Modeling for Requirements Engineering. MIT Press. A very interesting case study.{{: | + | |
- | * L.M.S.Tran and F.Massacci. //Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution// | + | |
- | * L.M.S.Tran. // | + | |
- | * Asnar Y., Massacci F., Saïdane A., Riccucci C., Felici M., Tedeschi A., El Khoury P., Li K., Seguran M., Zannone N.: Organizational Patterns for Security and Dependability: | + | |
- | + | ||
- | ==== Earlier papers ==== | + | |
- | + | ||
- | | + | |
- | * Compagna L., El Khoury P., Krausová A., Massacci F, and Zannone N..How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. // | + | |
- | * Massacci F., and Mylopoulos J., Zannone N. Computer-aided Support for Secure Tropos. //Automated Software Engineering.// | + | |
- | * Massacci F., Mylopoulos J., Zannone N., "From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach" | + | |
- | * Y. Asnar, R. Bonato, P. Giorgini, F. Massacci, V. Meduri, C. Ricucci and A. Saidane. Secure and Dependable Patterns in Organizations: | + | |
- | * F. Massacci, J. Mylopoulos and N. Zannone. Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations. //The VLDB Journal//. 2006. {{: | + | |
- | * Giorgini P., Massacci F., Mylopoulos J., Zannone N., " | + | |
- | * P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Detecting Conflicts of Interest. In Proc. of IEEE RE'06. pages 315-318. IEEE Press, 2006. | + | |
- | * Massacci F., Prest M., Zannone N., "Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation" | + | |
- | * //**P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of IEEE RE'05, IEEE Press 2005. (Ten Years Most Influential Paper IEEE RE 2015). {{: | + | |
- | * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust' | + | |
- | + | ||
- | + | ||
- | ===== Talks and Tutorials ===== | + | |
- | + | ||
- | * Y. Asnar and Fabio Massacci. //Managing Security in Services - a Goal & Process Approach//. Tutorial at the IEEE International Conference on Intelligence and Security Informatics. 2011 {{research_activities: | + | |
- | * Y. Asnar, H. W. Lim, F. Massacci, C. Worledge: Realizing Trustworthy Business Services by A New GRC. The //ISACA Journal// Online edition 2010. {{: | + | |
- | ===== Software ===== | + | |
- | + | ||
- | *[[http:// | + | |
- | + | ||
- | *A very old tool that we used in the first papers is here. http:// | + |
nov_2016.1492790422.txt.gz · Last modified: (external edit)