The layered security model: Analysis of systems from the conceptual, logical and physical viewpoints

被引:0
|
作者
Blackwell, Clive [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham, Surrey, England
关键词
security model; architecture; fraud; financial transaction;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Most security models are only suitable for limited problem domains, and are incomplete, as they do not consider all the ways security issues can arise. We have developed a practical security model that can be used to analyse systems more systematically, match more faithfully to their requirements, and which has widespread application. The model has three layers, which are the semantic (involving people), logical (computers) and physical layers including the relationships and interactions between them. This allows the analysis of systems in their entirety including human and physical factors, not just as technical systems. The model also has a horizontal constituent to represent the separate conceptual scope and connectivity of systems and entities at different layers. The model is intended to help in analysing, designing and configuring systems that can possibly be compromised at all three layers. It has application to broad problem domains such as critical infrastructure protection and specific business contexts such as banking applications. In addition, it can be used on a smaller scale to analyse components of systems or to investigate specific vulnerabilities. We examine the system of credit card transactions on the Internet to demonstrate the benefits of the model.
引用
收藏
页码:27 / 36
页数:10
相关论文
共 50 条
  • [31] SYSTEMS-ANALYSIS - A SYSTEMIC ANALYSIS OF A CONCEPTUAL-MODEL
    SHEMER, I
    COMMUNICATIONS OF THE ACM, 1987, 30 (06) : 506 - 512
  • [32] A Conceptual Reference Model for Human as a Service Provider in Cyber Physical Systems
    Ignatius, Hargyo T. N.
    Bahsoon, Rami
    2021 INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS (SEAMS 2021), 2021, : 1 - 10
  • [33] Robustness analysis for switched cyber-physical systems via logical networks
    Zhao, Guodong
    Zhang, Wenxin
    Li, Haitao
    ASIAN JOURNAL OF CONTROL, 2025,
  • [34] Applying the layered decision model to the design of language-based security systems
    Wei, Huaqiang
    Alves-Foss, Jim
    IRI 2006: PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2006, : 182 - +
  • [35] A security risk analysis model for information systems
    In, HP
    Kim, YG
    Lee, T
    Moon, CJ
    Jung, YJ
    Kim, I
    SYSTEMS MODELING AND SIMULATION: THEORY AND APPLICATIONS, 2005, 3398 : 505 - 513
  • [36] Quantum entanglement in physical and cognitive systems: A conceptual analysis and a general representation
    D. Aerts
    J. Aerts Arguëlles
    L. Beltran
    S. Geriente
    M. Sassoli de Bianchi
    S. Sozzo
    T. Veloz
    The European Physical Journal Plus, 134
  • [37] Quantum entanglement in physical and cognitive systems: A conceptual analysis and a general representation
    Aerts, D.
    Arguelles, J. Aerts
    Beltran, L.
    Geriente, S.
    de Bianchi, M. Sassoli
    Sozzo, S.
    Veloz, T.
    EUROPEAN PHYSICAL JOURNAL PLUS, 2019, 134 (10):
  • [38] Analysis of Security Threats and Vulnerability for Cyber-physical Systems
    Gao, Yang
    Peng, Yong
    Xie, Feng
    Zhao, Wei
    Wang, Dejin
    Han, Xuefeng
    Lug, Tianbo
    Lie, Zhao
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 50 - 55
  • [39] An Assessment of Security Analysis Tools for Cyber-Physical Systems
    Lemaire, Laurens
    Vossaert, Jan
    De Decker, Bart
    Naessens, Vincent
    RISK ASSESSMENT AND RISK-DRIVEN QUALITY ASSURANCE, RISK 2016, 2017, 10224 : 66 - 81
  • [40] A Security Analysis of Cyber-Physical Systems Architecture for Healthcare
    Seifert, Darren
    Reza, Hassan
    COMPUTERS, 2016, 5 (04)