A systems approach for eliciting mission-centric security requirements

Bryan T. Carter, Georgios Bakirtzis, Carl R. Elks, Cody H. Fleming

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The security of cyber-physical systems is first and foremost a safety problem, yet it is typically handled as a traditional security problem, which means that solutions are based on defending against threats and are often implemented too late. This approach neglects to take into consideration the context in which the system is intended to operate, thus system safety may be compromised. This paper presents a systems-theoretic analysis approach that combines stakeholder perspectives with a modified version of Systems-Theoretic Accident Model and Process (STAMP) that allows decision-makers to strategically enhance the safety, resilience, and security of a cyber-physical system against potential threats. This methodology allows the capture of vital mission-specific information in a model, which then allows analysts to identify and mitigate vulnerabilities in the locations most critical to mission success. We present an overview of the general approach followed by a real example using an unmanned aerial vehicle conducting a reconnaissance mission.

Original languageEnglish
Title of host publication12th Annual IEEE International Systems Conference, SysCon 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-8
Number of pages8
ISBN (Electronic)9781538636640
DOIs
Publication statusPublished - 30 May 2018
Externally publishedYes
Event12th Annual IEEE International Systems Conference, SysCon 2018 - Vancouver, Canada
Duration: 24 Apr 201826 Apr 2018

Publication series

Name12th Annual IEEE International Systems Conference, SysCon 2018 - Proceedings

Conference

Conference12th Annual IEEE International Systems Conference, SysCon 2018
Country/TerritoryCanada
CityVancouver
Period24/04/1826/04/18

Fingerprint

Dive into the research topics of 'A systems approach for eliciting mission-centric security requirements'. Together they form a unique fingerprint.

Cite this