Skip to main content
SHARE
Publication

Validating Cyber Security Requirements: A Case Study...

by Robert K Abercrombie, Frederick T Sheldon, Ali Mili
Publication Type
Conference Paper
Publication Date
Page Numbers
1 to 10
Volume
44th
Publisher Location
Los Alamitos, California, United States of America
Conference Name
2011 44th Annual Hawaii International Conference on System Sciences
Conference Location
Kauai, Hawaii, United States of America
Conference Sponsor
IEEE Computer Society, Unviersity of Hawaii at Manoa
Conference Date
-

Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, security should not be quantified by the number of vulnerabilities. Security should be managed by pursuing a policy that leads us first to the highest impact vulnerabilities. In light of these observations, we argue in favor of shifting our focus from vulnerability avoidance/removal to measurable security attributes. To this effect, we recommend a logic be used for system security, which captures/represents security properties in quantifiable, verifiable, measurable terms – so that it is possible to reason about security in terms of its observable/perceptible effects rather than its hypothesized causes. This approach is orthogonal to existing techniques for vulnerability avoidance, removal, detection, and
recovery, in the sense that it provides a means to assess, quantify, and combine these techniques.