The layered security model: Analysis of systems from the conceptual, logical and physical viewpoints

被引:0
|
作者
Blackwell, Clive [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham, Surrey, England
关键词
security model; architecture; fraud; financial transaction;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Most security models are only suitable for limited problem domains, and are incomplete, as they do not consider all the ways security issues can arise. We have developed a practical security model that can be used to analyse systems more systematically, match more faithfully to their requirements, and which has widespread application. The model has three layers, which are the semantic (involving people), logical (computers) and physical layers including the relationships and interactions between them. This allows the analysis of systems in their entirety including human and physical factors, not just as technical systems. The model also has a horizontal constituent to represent the separate conceptual scope and connectivity of systems and entities at different layers. The model is intended to help in analysing, designing and configuring systems that can possibly be compromised at all three layers. It has application to broad problem domains such as critical infrastructure protection and specific business contexts such as banking applications. In addition, it can be used on a smaller scale to analyse components of systems or to investigate specific vulnerabilities. We examine the system of credit card transactions on the Internet to demonstrate the benefits of the model.
引用
收藏
页码:27 / 36
页数:10
相关论文
共 50 条
  • [41] Performance Analysis of Secure GPSM Systems for Physical Layer Security
    Pang, Yashan
    Lei, Xia
    Xiao, Yue
    Li, You
    Xiang, Wei
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [42] Analysis of Cyber Physical Systems Security Via Networked Attacks
    Ge, Hui
    Yue, Dong
    Xie, Xiang-peng
    Deng, Song
    Zhang, Yan
    PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 4266 - 4272
  • [43] Analysis of physical layer security performance for satellite communication systems
    Xiao Y.
    Zhu X.
    Zhao S.
    Ren B.
    Shen Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (03): : 163 - 169
  • [44] Analysis of information flow security in cyber-physical systems
    Akella, Ravi
    Tang, Han
    McMillin, Bruce M.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2010, 3 (3-4) : 157 - 173
  • [45] Taxonomy Analysis of Security Aspects in Cyber Physical Systems Applications
    Gawanmeh, Amjad
    Alomari, Ahmad
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2018,
  • [46] A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems
    Span, Martin Trae
    Mailloux, Logan O.
    Grimaila, Michael R.
    Young, William Bill
    2018 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2018,
  • [47] Security Analysis: From Model to System Analysis
    Drouot, Bastien
    Monthe, Valery
    Guerin, Sylvain
    Champeau, Joel
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2022, 2023, 13857 : 133 - 152
  • [48] Target functions of the conceptual model for adaptive monitoring of integrated security in material processing systems
    Parashchuk, Igor
    Kotenko, Igor
    MATERIALS TODAY-PROCEEDINGS, 2021, 38 : 1454 - 1458
  • [49] A Conceptual Model for Mitigation of Root Causes of Uncertainty in Cyber-Physical Systems
    Asmat, Mah Noor
    Khan, Saif Ur Rehman
    Mashkoor, Atif
    DATABASE AND EXPERT SYSTEMS APPLICATIONS - DEXA 2021 WORKSHOPS, 2021, 1479 : 9 - 17
  • [50] Model-based risk assessment for cyber physical systems security
    Tantawy, Ashraf
    Abdelwahed, Sherif
    Erradi, Abdelkarim
    Shaban, Khaled
    COMPUTERS & SECURITY, 2020, 96