The layered security model: Analysis of systems from the conceptual, logical and physical viewpoints

被引:0
|
作者
Blackwell, Clive [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham, Surrey, England
关键词
security model; architecture; fraud; financial transaction;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Most security models are only suitable for limited problem domains, and are incomplete, as they do not consider all the ways security issues can arise. We have developed a practical security model that can be used to analyse systems more systematically, match more faithfully to their requirements, and which has widespread application. The model has three layers, which are the semantic (involving people), logical (computers) and physical layers including the relationships and interactions between them. This allows the analysis of systems in their entirety including human and physical factors, not just as technical systems. The model also has a horizontal constituent to represent the separate conceptual scope and connectivity of systems and entities at different layers. The model is intended to help in analysing, designing and configuring systems that can possibly be compromised at all three layers. It has application to broad problem domains such as critical infrastructure protection and specific business contexts such as banking applications. In addition, it can be used on a smaller scale to analyse components of systems or to investigate specific vulnerabilities. We examine the system of credit card transactions on the Internet to demonstrate the benefits of the model.
引用
收藏
页码:27 / 36
页数:10
相关论文
共 50 条
  • [21] Conceptualizing the key features of cyber-physical systems in a multi-layered representation for safety and security analysis
    Guzman, Nelson H.
    Wied, Morten
    Kozine, Igor
    Lundteigen, Mary Ann
    SYSTEMS ENGINEERING, 2020, 23 (02) : 189 - 210
  • [22] Understanding Uncertainty in Cyber-Physical Systems: A Conceptual Model
    Zhang, Man
    Selic, Bran
    Ali, Shaukat
    Yue, Tao
    Okariz, Oscar
    Norgren, Roland
    MODELLING FOUNDATIONS AND APPLICATIONS, ECMFA 2016, 2016, 9764 : 247 - 264
  • [23] A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems
    Sabaliauskaite, Giedre
    Adepu, Sridhar
    Mathur, Aditya
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2016), 2018, 10242 : 189 - 200
  • [24] Logical Design of Graph Databases from an Entity-Relationship Conceptual Model
    de Sousa, Victor Martins
    del Val Cura, Luis Mariano
    IIWAS2018: THE 20TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES, 2014, : 183 - 189
  • [25] Conceptual Systems Security Requirements Analysis: Aerial Refueling Case Study
    Span, Martin, III
    Mailloux, Logan O.
    Mills, Robert F.
    Young, William, Jr.
    IEEE ACCESS, 2018, 6 : 46668 - 46682
  • [26] Security analysis of socio-technical physical systems
    Lenzini, Gabriele
    Mauw, Sjouke
    Ouchani, Samir
    COMPUTERS & ELECTRICAL ENGINEERING, 2015, 47 : 258 - 274
  • [27] Cyber physical systems security: Analysis, challenges and solutions
    Ashibani, Yosef
    Mahmoud, Qusay H.
    COMPUTERS & SECURITY, 2017, 68 : 81 - 97
  • [29] Food Systems and Food Security: A Conceptual Model for Identifying Food System Deficiencies
    Rutten, Lila Finney
    Yaroch, Amy Lazarus
    Story, Mary
    JOURNAL OF HUNGER & ENVIRONMENTAL NUTRITION, 2011, 6 (03) : 239 - 246
  • [30] Towards a Security Cost Model for Cyber-Physical Systems
    Ivkic, Igor
    Mauthe, Andreas
    Tauber, Markus
    2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,