TY - CHAP
T1 - Assessing security and privacy behavioural risks for self-protection systems
AU - Yu, Yijun
AU - Nobukazu, Yoshioka
AU - Tamai, Tetsuo
N1 - Publisher Copyright:
© Springer Nature Singapore Pte Ltd. 2019. All Rights reserved.
PY - 2019/1/14
Y1 - 2019/1/14
N2 - Security and privacy can often be considered from two perspectives. The first perspective is that of the attacker who seeks to exploit vulnerabilities of the system to harm assets such as the software system itself or its users. The second perspective is that of the defender who seeks to protect the assets by minimising the likelihood of attacks on those assets. This chapter focuses on analysing security and privacy risks from these two perspectives considering both the software system and its uncertain environment including uncertain human behaviours. These risks are dynamically changing at runtime, making them even harder to analyse. To compute the range of these risks, we highlight how to alternate between the attacker and the defender perspectives as part of an iterative process. We then quantify the risk assessment as part of adaptive security and privacy mechanisms complementing the logic reasoning of qualitative risks in argumentation (Yu et al., J Syst Softw 106:102(replacement character)116, 2015). We illustrate the proposed approach through the risk analysis of examples in security and privacy.
AB - Security and privacy can often be considered from two perspectives. The first perspective is that of the attacker who seeks to exploit vulnerabilities of the system to harm assets such as the software system itself or its users. The second perspective is that of the defender who seeks to protect the assets by minimising the likelihood of attacks on those assets. This chapter focuses on analysing security and privacy risks from these two perspectives considering both the software system and its uncertain environment including uncertain human behaviours. These risks are dynamically changing at runtime, making them even harder to analyse. To compute the range of these risks, we highlight how to alternate between the attacker and the defender perspectives as part of an iterative process. We then quantify the risk assessment as part of adaptive security and privacy mechanisms complementing the logic reasoning of qualitative risks in argumentation (Yu et al., J Syst Softw 106:102(replacement character)116, 2015). We illustrate the proposed approach through the risk analysis of examples in security and privacy.
UR - http://www.scopus.com/inward/record.url?scp=85076916316&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85076916316&partnerID=8YFLogxK
U2 - 10.1007/978-981-13-2185-6_6
DO - 10.1007/978-981-13-2185-6_6
M3 - Chapter
AN - SCOPUS:85076916316
SN - 9789811321849
SP - 135
EP - 147
BT - Engineering adaptive software systems
PB - Springer Singapore
ER -