학술논문

Risk-based systems security engineering: stopping attacks with intention
Document Type
Periodical
Source
IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 2(6):59-62 Jan, 2004
Subject
Computing and Processing
Aerospace
Bioengineering
Components, Circuits, Devices and Systems
Engineered Materials, Dielectrics and Plasmas
Engineering Profession
Fields, Waves and Electromagnetics
General Topics for Engineers
Nuclear Engineering
Robotics and Control Systems
Signal Processing and Analysis
Transportation
Communication, Networking and Broadcast Technologies
Photonics and Electrooptics
Power, Energy and Industry Applications
Systems engineering and theory
Information security
Data security
Risk analysis
Availability
Space missions
Computer hacking
Design engineering
Information systems
Predictive models
Mordor
security systems
attack intentions
profiles
threat assessment
Language
ISSN
1540-7993
1558-4046
Abstract
In most modern information systems (IS), functionality and security are competing design goals. Therefore, system designers are constantly forced to make security-related trade-off decisions. Systems security engineers must build systems that are secure against real-world attacks without overengineering against any particular one. By understanding which attacks are most likely and which risks are most serious, system designers can make informed security-related trade-off decisions. We describe a systems security engineering methodology designers can use to make these decisions.