140 likes | 267 Views
E-RISE 2011 E ngineering RI sk and SE curity Requirements. By Yudistira Asnar, Fabio Massacci, Alberto Battocchi (UNITN) a nd Camille Sabroux (Université Paris Dauphine). Background Objective Study Setting Participants Expected Outcomes Agenda. Outline. E-RISE 2011 - Yudis(c).
E N D
E-RISE 2011Engineering RIsk and SEcurity Requirements By Yudistira Asnar, Fabio Massacci, Alberto Battocchi (UNITN) and Camille Sabroux (Université Paris Dauphine)
Background • Objective • Study Setting • Participants • Expected Outcomes • Agenda Outline E-RISE 2011 - Yudis(c)
Increase of Security-related Incidents • Attacks and Breaches • Identity thefts, malware, fraud • Regulations • EU Data Protection, EU Cybercrime, HIPAA, SOX • Complexity of Software Systems • Compositional Systems • Future Internet Services • Location-based, smart-grid, context-aware, healthcare Background E-RISE 2011 - Yudis(c)
New approach of Software System Development • Architecture: SOA, Clouds, Mobile, Ad-hoc • Computing: Multi-core, multi-tenancy • Paradigm: Goal-, Value-, Service-, Social-oriented • Various methods to engineer a secure system • Standards and Best Practices: ISO 2700X, CC, COSO, COBIT, ITIL, etc. • Research area: i*-based, problem frame, CORAS, domain-ontology, etc. Trends E-RISE 2011 - Yudis(c)
Security Method in Research Taken from http://www.authormapper.com/ E-RISE 2011 - Yudis(c)
Do those methods work? and Why? E-RISE 2011 - Yudis(c)
Evaluate and benchmark E-RISE methods through an empirical study • Learn how and why participants intend to adopt a method • Gather feedback to improve a method. Particularly, investigating strength, weakness, and limitation of the method Objective E-RISE 2011 - Yudis(c)
Perform a series of case studies comparing how one learns, adopts, and performs a security method • Scope of the study: • A method that analyze risk and security requirements of an information system • Artifacts collected during the study will be analyzed to achieve the study objectives Study Setting E-RISE 2011 - Yudis(c)
Method Designers Roles in E-RISE 2011 • Magister students with background either at Information System, IT architecture, IT audit, or Risk & Security Analysis • Université Paris Dauphine, France • University of Trento, Italy • Researchers/practitioners that master a security method • Secure Tropos • Problem Frame • SI* • CORAS • COBIT Participants E-RISE 2011 - Yudis(c)
Participants (in a group of 4 people) will learn about a security method with the guidance of a method designer • Groups analyze security concerns of a given problem using the defined security method E-RISE 2011 E-RISE 2011 - Yudis(c)
Presentation • List of recommendation about security measures to the management (e.g., CTO, CEO) • Priority among the recommendations • Rationale of such recommendations Expected Results from E-RISE E-RISE 2011 - Yudis(c)
Expected Results from E-RISE Final Executive Report (Deadline June 5, 2011) • Documenting the process on producing such recommendations • 1 page of Recommendations (max.) • 4 pages of documenting process for auditing purposes (max.) • Annexes: eventual artifacts, diagrams, tables, etc.
Training Phase [May 9-13, 2011] • Participants learn about the defined method • May 13 in Paris • Meet the method designers for a face-to-face tutorial • Application Phase [May 14-27, 2011] • Participants perform the collaborative work upon the given scenario and using the defined method • May 14-25 – remotely • May 26-27 in Paris Agenda E-RISE 2011 - Yudis(c)
Thank you Question? E-RISE 2011 - Yudis(c)