Making Trade-offs among Security and Other Requirements during System Design
Employing a design solution can satisfy some requirements while having negative side-effects on some other software requirements and project objectives. Ultimately, selecting a design solution among multiple options involves making trade-offs among competing requirements. These trade-offs, especiall...
Main Author: | |
---|---|
Other Authors: | |
Language: | en_ca |
Published: |
2012
|
Subjects: | |
Online Access: | http://hdl.handle.net/1807/32704 |
id |
ndltd-LACETR-oai-collectionscanada.gc.ca-OTU.1807-32704 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-LACETR-oai-collectionscanada.gc.ca-OTU.1807-327042013-04-17T04:19:48ZMaking Trade-offs among Security and Other Requirements during System DesignElahi, GolnazSecurityTrade-offRequirementsSoftware Design0984Employing a design solution can satisfy some requirements while having negative side-effects on some other software requirements and project objectives. Ultimately, selecting a design solution among multiple options involves making trade-offs among competing requirements. These trade-offs, especially at the early stages of software development, are often hard to identify or quantify, and can be subjective. Security is one critical requirement among many, which can cause critical trade-offs and severe costs. Damages from security attacks can be overwhelming and the costs increase every year. The threat of vulnerabilities and their exploitation by potential adversaries calls for careful analysis of security risks and trade-offs that security solutions impose, from the viewpoints of both defenders and attackers. Since software developers and analysts are usually not security experts, detecting potential threats within software systems can be problematic. Even when threats are known, the risk factors, either the probability of a successful attack or the resulting damage of a successful attack, are not always known or numerically measurable. In this situation, selecting proper security solutions can be challenging, when mitigating impacts and side-effects of solutions are often not quantifiable. This thesis addresses such challenges in identifying and making trade-offs among security and other system requirements and stakeholders' goals. This work introduces a framework for identifying and modeling security risks and requirements trade-offs. The central idea in this thesis is analyzing security requirements on the basis of predicting software vulnerabilities, weaknesses or flaws that can be exploited to break into the system. Vulnerabilities and exploitation scenarios are specified within goal-oriented requirements models of the system. This approach enables analysis of vulnerability exploitations and their impacts on the running system. The structure of goal-oriented security requirements models enables tracing the ultimate impacts of the exploitations on high-level goals of stakeholders and design objectives. In order to evaluate the risk of vulnerabilities, this framework intertwines the Common Vulnerability Scoring System (CVSS) with security requirements risk assessment. The proposed framework provides a decision aid method that takes into the account risks, competing requirements, security solutions, their impacts on risks, and their side-effects on other requirements, to aid decision makers to select a solution among alternative security solutions. The proposed decision analysis method helps analysts to make requirements trade-offs systematically, in the absence of quantitative data, or when a mixture of both quantitative and qualitative data are available.Yu, Eric2012-062012-08-21T17:49:50ZNO_RESTRICTION2012-08-21T17:49:50Z2012-08-21Thesishttp://hdl.handle.net/1807/32704en_ca |
collection |
NDLTD |
language |
en_ca |
sources |
NDLTD |
topic |
Security Trade-off Requirements Software Design 0984 |
spellingShingle |
Security Trade-off Requirements Software Design 0984 Elahi, Golnaz Making Trade-offs among Security and Other Requirements during System Design |
description |
Employing a design solution can satisfy some requirements while having negative side-effects on some other software requirements and project objectives. Ultimately, selecting a design solution among multiple options involves making trade-offs among competing requirements. These trade-offs, especially at the early stages of software development, are often hard to identify or quantify, and can be subjective. Security is one critical requirement among many, which can cause critical trade-offs and severe costs. Damages from security attacks can be overwhelming and the costs increase every year. The threat of vulnerabilities and their exploitation by potential adversaries calls for careful analysis of security risks and trade-offs that security solutions impose, from the viewpoints of both defenders and attackers.
Since software developers and analysts are usually not security experts, detecting potential threats within software systems can be problematic. Even when threats are known, the risk factors, either the probability of a successful attack or the resulting damage of a successful attack, are not always known or numerically measurable. In this situation, selecting proper security solutions can be challenging, when mitigating impacts and side-effects of solutions are often not quantifiable.
This thesis addresses such challenges in identifying and making trade-offs among security and other system requirements and stakeholders' goals. This work introduces a framework for identifying and modeling security risks and requirements trade-offs. The central idea in this thesis is analyzing security requirements on the basis of predicting software vulnerabilities, weaknesses or flaws that can be exploited to break into the system. Vulnerabilities and exploitation scenarios are specified within goal-oriented requirements models of the system. This approach enables analysis of vulnerability exploitations and their impacts on the running system. The structure of goal-oriented security requirements models enables tracing the ultimate impacts of the exploitations on high-level goals of stakeholders and design objectives.
In order to evaluate the risk of vulnerabilities, this framework intertwines the Common Vulnerability Scoring System (CVSS) with security requirements risk assessment. The proposed framework provides a decision aid method that takes into the account risks, competing requirements, security solutions, their impacts on risks, and their side-effects on other requirements, to aid decision makers to select a solution among alternative security solutions. The proposed decision analysis method helps analysts to make requirements trade-offs systematically, in the absence of quantitative data, or when a mixture of both quantitative and qualitative data are available. |
author2 |
Yu, Eric |
author_facet |
Yu, Eric Elahi, Golnaz |
author |
Elahi, Golnaz |
author_sort |
Elahi, Golnaz |
title |
Making Trade-offs among Security and Other Requirements during System Design |
title_short |
Making Trade-offs among Security and Other Requirements during System Design |
title_full |
Making Trade-offs among Security and Other Requirements during System Design |
title_fullStr |
Making Trade-offs among Security and Other Requirements during System Design |
title_full_unstemmed |
Making Trade-offs among Security and Other Requirements during System Design |
title_sort |
making trade-offs among security and other requirements during system design |
publishDate |
2012 |
url |
http://hdl.handle.net/1807/32704 |
work_keys_str_mv |
AT elahigolnaz makingtradeoffsamongsecurityandotherrequirementsduringsystemdesign |
_version_ |
1716580850666045440 |