Systems Theory and Information Security: Foundations for a New Educational Approach

Joseph R. Laracy, T. Marlowe
{"title":"Systems Theory and Information Security: Foundations for a New Educational Approach","authors":"Joseph R. Laracy, T. Marlowe","doi":"10.6025/ISEJ/2018/5/2/35-48","DOIUrl":null,"url":null,"abstract":"Information security education has traditionally been approached with a variety of tools. Models such as BellLaPadula and Clark-Wilson, cryptography, and formal methods seek to design systems without certain classes of vulnerabilities. Red teaming seeks to find vulnerabilities that were missed and security software often removes the vulnerabilities. To a lesser extent, probabilistic risk assessment and game theory have also been applied to assess threats. However, on their own, in isolation, these approaches have not “solved” the information security crisis. Internet security in particular is an area of great concern given the plethora of vulnerabilities that enable threats to confidentiality, integrity, availability, non-repudiation, authorization, authentication, and auditability. A new approach to information security engineering education is necessary that views the Internet as a complex, socio-technical system. A systems perspective acknowledges that security can only be achieved through a holistic model that addresses technological architecture and software processes, organizational behavior, and human factors. This paper suggests a novel method for information security education to identify and characterize current deficiencies in a network security control structure, elucidate the relationship between software/systems engineering and security risks, and inform an architectural description of a secure information system architecture.","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Education Journal (ISEJ)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.6025/ISEJ/2018/5/2/35-48","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Information security education has traditionally been approached with a variety of tools. Models such as BellLaPadula and Clark-Wilson, cryptography, and formal methods seek to design systems without certain classes of vulnerabilities. Red teaming seeks to find vulnerabilities that were missed and security software often removes the vulnerabilities. To a lesser extent, probabilistic risk assessment and game theory have also been applied to assess threats. However, on their own, in isolation, these approaches have not “solved” the information security crisis. Internet security in particular is an area of great concern given the plethora of vulnerabilities that enable threats to confidentiality, integrity, availability, non-repudiation, authorization, authentication, and auditability. A new approach to information security engineering education is necessary that views the Internet as a complex, socio-technical system. A systems perspective acknowledges that security can only be achieved through a holistic model that addresses technological architecture and software processes, organizational behavior, and human factors. This paper suggests a novel method for information security education to identify and characterize current deficiencies in a network security control structure, elucidate the relationship between software/systems engineering and security risks, and inform an architectural description of a secure information system architecture.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
系统理论与信息安全:一种新的教育方法的基础
传统上,信息安全教育采用多种工具。BellLaPadula和Clark-Wilson等模型、密码学和形式化方法寻求设计没有特定类型漏洞的系统。红队试图找到被遗漏的漏洞,安全软件通常会删除这些漏洞。在较小程度上,概率风险评估和博弈论也被应用于评估威胁。然而,这些方法本身,孤立地,并没有“解决”信息安全危机。Internet安全是一个特别值得关注的领域,因为大量的漏洞会对机密性、完整性、可用性、不可否认性、授权、身份验证和可审计性造成威胁。一种新的信息安全工程教育方法是必要的,它将互联网视为一个复杂的社会技术系统。系统视角承认,安全性只能通过解决技术体系结构和软件过程、组织行为和人为因素的整体模型来实现。本文提出了一种新的信息安全教育方法,以识别和描述当前网络安全控制结构中的缺陷,阐明软件/系统工程与安全风险之间的关系,并告知安全信息系统架构的架构描述。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
First Laboratory Experience for Cyber Engineering and Cybersecurity Students A Virtual and On-site Hackathon to Recruit High School Students within Cybersecurity Major Mind, Unity and Software Security - Analysis of Functional Unity in Cases of Dataonly Attack Approximating DEX Utility Functions with Methods UTA and ACUTA Comprehensibility of Classification Trees–Survey Design
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1