Model-based Threat and Risk Assessment for Systems Design

Integrating cybersecurity considerations in the design of modern systems is a significant challenge. As systems increasingly rely on connectivity and software to perform, cybersecurity issues of confidentiality, integrity and availability emerge. Addressing these issues during the design of a system – a security by-design approach – is desirable, and considered preferable to patching an existing design with extraneous components and mechanisms. In this paper, we present a model-based methodology for cybersecurity related systems design. This field-proven methodology takes into consideration cybersecurity threats alongside the system’s composition and existing mechanisms, in order to communicate, assess and drive the incorporation of security controls into the system design. We discuss aspects of the methodology’s design and how it relates to its reallife applications and usage context.

[1]  Kevin Forsberg,et al.  The Relationship of System Engineering to the Project Cycle , 1991 .

[2]  Yuval Shahar,et al.  A New Methodology for Information Security Risk Assessment for Medical Devices and Its Evaluation , 2020, ArXiv.

[3]  Carol Woody,et al.  Threat Modeling: A Summary of Available Methods , 2018 .

[4]  Yuval Elovici,et al.  Security Analysis of Radar Systems , 2019, CPS-SPC@CCS.

[5]  Logan O. Mailloux,et al.  Examination of security design principles from NIST SP 800-160 , 2018, 2018 Annual IEEE International Systems Conference (SysCon).

[6]  Avi Shaked,et al.  Designing development processes related to system of systems using a modeling framework , 2019, Syst. Eng..

[7]  R. Lehrer Designing for Development , 2015, Human Development.

[8]  Jos van Hillegersberg,et al.  Evaluating the Visual Syntax of UML: An Analysis of the Cognitive Effectiveness of the UMLFamily of Diagrams , 2009, SLE.

[9]  Ron Weber,et al.  On the ontological expressiveness of information systems analysis and design grammars , 1993, Inf. Syst. J..

[10]  Nancy R. Mead How To Compare the Security Quality Requirements Engineering (SQUARE) Method with Other Methods , 2007 .

[11]  Nancy R. Mead,et al.  Security quality requirements engineering (SQUARE) methodology , 2005, SESS@ICSE.

[12]  Xiaohong Yuan,et al.  Retrieving relevant CAPEC attack patterns for secure software development , 2014, CISR '14.

[13]  Jaume Barceló,et al.  Model-Based Systems Engineering: An Emerging Approach for Modern Systems , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[14]  Raimundas Matulevicius,et al.  Privacy-enhanced BPMN: enabling data privacy analysis in business processes models , 2019, Software and Systems Modeling.