2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) 2018
DOI: 10.1109/cybersecpods.2018.8560682
|View full text |Cite
|
Sign up to set email alerts
|

A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…In [45] this latter is integrated with the Combined Harm Analysis of Safety and Security for Information Systems (CHASSIS) methods for the information lifecycle analysis to complement and generate additional considerations on top of the ones provided by STPA-Sec analysis. An additional methodological structure is provided also in [46] where the NIST (National Institute of Standards and Technology) requirements have been integrated throughout the security analysis. In [47] it is pointed out how STPA-Sec lacks in considering the IT security issues such as data confidentiality.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [45] this latter is integrated with the Combined Harm Analysis of Safety and Security for Information Systems (CHASSIS) methods for the information lifecycle analysis to complement and generate additional considerations on top of the ones provided by STPA-Sec analysis. An additional methodological structure is provided also in [46] where the NIST (National Institute of Standards and Technology) requirements have been integrated throughout the security analysis. In [47] it is pointed out how STPA-Sec lacks in considering the IT security issues such as data confidentiality.…”
Section: Literature Reviewmentioning
confidence: 99%
“…An unacceptable loss "defines high level, intolerable system outcomes to key stakeholders" [12]. While hazards identify system states that when coupled with worst case conditions lead to an unacceptable loss [5]. In other words, the unacceptable losses must be avoided to enable system success for the stakeholder.…”
Section: Devsecops Ssf Stpa-sec Analysis Case Studymentioning
confidence: 99%
“…SC-33. 5 The system must prevent the unauthorized tampering or modification of system security monitoring.…”
Section: Sc-332mentioning
confidence: 99%
See 2 more Smart Citations