首页 > 最新文献

Insight最新文献

英文 中文
Attitudes 的态度
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12537
Rick Dove

Digital controls and internet connectivity have fostered a hostile predatory environment for modern systems. Organized crime and nation state interests are naturally compelled to exploit these readily accessible opportunities for financial and political advantages. Systems engineering is being called upon to reorient its priorities accordingly. INCOSE's Future of Systems Engineering (FuSE) to realize the Systems Engineering Vision 2035 has a security-focused activity exploring what this reorientation might be. This article shares some of that thinking, exposes some issues in need of more thinking, and suggests why and how all systems engineers could and should be part of this thinking.

数字控制和互联网连接为现代系统营造了一个充满敌意的掠夺性环境。有组织犯罪和民族国家的利益自然会被迫利用这些唾手可得的机会来获取经济和政治优势。系统工程正被要求相应地重新调整其优先事项。为了实现2035年系统工程愿景,INCOSE的系统工程未来(FuSE)有一个以安全为重点的活动,探索这种重新定位可能是什么。本文分享了其中的一些想法,揭示了一些需要更多思考的问题,并建议为什么以及如何所有系统工程师都可以并且应该成为这种想法的一部分。
{"title":"Attitudes","authors":"Rick Dove","doi":"10.1002/inst.12537","DOIUrl":"10.1002/inst.12537","url":null,"abstract":"<div>\u0000 \u0000 <p>Digital controls and internet connectivity have fostered a hostile predatory environment for modern systems. Organized crime and nation state interests are naturally compelled to exploit these readily accessible opportunities for financial and political advantages. Systems engineering is being called upon to reorient its priorities accordingly. INCOSE's Future of Systems Engineering (FuSE) to realize the Systems Engineering Vision 2035 has a security-focused activity exploring what this reorientation might be. This article shares some of that thinking, exposes some issues in need of more thinking, and suggests why and how all systems engineers could and should be part of this thinking.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"8-10"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Systems Thinking to Advance Security in the Future of Systems Engineering (FuSE), a Progress Report 使用系统思维在系统工程(FuSE)的未来推进安全,一份进展报告
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12538
Systems Security Working Group

The Security in the Future of Systems Engineering (FuSE) team has made significant progress since its launch to realize the INCOSE vision described in Systems Engineering Vision 2035 (INCOSE 2021). The output products to date promote improved systems engineering practices to achieve security as a foundational perspective. The systems thinkers on this team have performed holistic analysis of current practices to expose existing anti-patterns and mental models that informed the transformation to future practices that can yield desired results and achieve the 2035 vision. Needs-oriented, loss-driven, capability-based analysis to define security strategies that become functional requirements promotes stakeholder alignment of the security vision and leads to effective security tactics and techniques that collectively achieve the security strategies. The result is a system that achieves functional perseverance in a hostile predatory environment. The work products completed so far and those in progress reflect our efforts to transition practices to a future where our systems are designed to achieve and sustain security as an intentional capability of the system throughout its lifecycle.

自启动以来,系统工程未来安全(FuSE)团队在实现系统工程愿景2035 (INCOSE 2021)中描述的INCOSE愿景方面取得了重大进展。迄今为止的输出产品促进了改进的系统工程实践,以实现安全性作为一个基本的观点。这个团队中的系统思考者已经对当前的实践进行了全面的分析,以揭示现有的反模式和心智模型,这些模式和心智模型为未来的实践提供了信息,这些实践可以产生预期的结果,并实现2035年的愿景。以需求为导向、损失驱动、基于功能的分析来定义安全策略,这些策略将成为功能需求,从而促进涉众对安全愿景的一致,并导致有效的安全策略和技术,从而共同实现安全策略。结果是一个系统在敌对的掠夺性环境中实现了功能性的坚持。到目前为止完成的工作产品和正在进行的工作产品反映了我们将实践过渡到未来的努力,在未来,我们的系统被设计为在其整个生命周期中实现并维持安全性作为系统的有意能力。
{"title":"Using Systems Thinking to Advance Security in the Future of Systems Engineering (FuSE), a Progress Report","authors":"Systems Security Working Group","doi":"10.1002/inst.12538","DOIUrl":"10.1002/inst.12538","url":null,"abstract":"<div>\u0000 \u0000 <p>The Security in the Future of Systems Engineering (FuSE) team has made significant progress since its launch to realize the INCOSE vision described in <i>Systems Engineering Vision 2035</i> (INCOSE 2021). The output products to date promote improved systems engineering practices to achieve security as a foundational perspective. The systems thinkers on this team have performed holistic analysis of current practices to expose existing anti-patterns and mental models that informed the transformation to future practices that can yield desired results and achieve the 2035 vision. Needs-oriented, loss-driven, capability-based analysis to define security strategies that become functional requirements promotes stakeholder alignment of the security vision and leads to effective security tactics and techniques that collectively achieve the security strategies. The result is a system that achieves functional perseverance in a hostile predatory environment. The work products completed so far and those in progress reflect our efforts to transition practices to a future where our systems are designed to achieve and sustain security as an intentional capability of the system throughout its lifecycle.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"11-14"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When Malicious Actors Control Your Subsystems: A Systems Engineering Approach to Functional Perseverance 当恶意行为者控制你的子系统:一种功能坚持的系统工程方法
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12545
David Hetherington, Ivan Taylor

Security in modern engineered systems is not merely an added layer of protection but a prerequisite for system functionality. As systems engineers navigate the evolving security landscape, they must prioritize functional perseverance, the ability of a system to maintain operational integrity despite adversarial threats. This article examines a possible method for using system-theoretic process analysis (STPA) and system dynamics (SD) to enhance security-aware system engineering.

The approach shown is inspired by a 1982 paper called “The Byzantine Generals Problem” and is a peer-to-peer voting design that avoids single points of failure. In particular, we propose a system analysis and design approach that would allow the construction of a system capable of using peer-to-peer self-policing to detect an intruder that has already penetrated the security perimeter of the system and corrupted one or more of the subsystems. This article shows how STPA could inform the design of the peer-to-peer voting system and how SD could be used to examine the tradeoff of investments in redundancy versus the expected level of achieved resilience.

在现代工程系统中,安全不仅仅是一个额外的保护层,而且是系统功能的先决条件。当系统工程师在不断发展的安全环境中导航时,他们必须优先考虑功能持久性,即系统在面对敌对威胁时保持操作完整性的能力。本文探讨了一种使用系统理论过程分析(STPA)和系统动力学(SD)来增强安全感知系统工程的可能方法。所展示的方法受到1982年一篇名为“拜占庭将军问题”的论文的启发,是一种避免单点故障的点对点投票设计。特别是,我们提出了一种系统分析和设计方法,该方法允许构建一个能够使用点对点自我监管的系统,以检测已经渗透到系统安全边界并损坏一个或多个子系统的入侵者。本文展示了STPA如何为点对点投票系统的设计提供信息,以及如何使用SD来检查冗余投资与预期实现弹性水平之间的权衡。
{"title":"When Malicious Actors Control Your Subsystems: A Systems Engineering Approach to Functional Perseverance","authors":"David Hetherington,&nbsp;Ivan Taylor","doi":"10.1002/inst.12545","DOIUrl":"10.1002/inst.12545","url":null,"abstract":"<div>\u0000 \u0000 <p>Security in modern engineered systems is not merely an added layer of protection but a prerequisite for system functionality. As systems engineers navigate the evolving security landscape, they must prioritize functional perseverance, the ability of a system to maintain operational integrity despite adversarial threats. This article examines a possible method for using system-theoretic process analysis (STPA) and system dynamics (SD) to enhance security-aware system engineering.</p>\u0000 <p>The approach shown is inspired by a 1982 paper called “The Byzantine Generals Problem” and is a peer-to-peer voting design that avoids single points of failure. In particular, we propose a system analysis and design approach that would allow the construction of a system capable of using peer-to-peer self-policing to detect an intruder that has already penetrated the security perimeter of the system and corrupted one or more of the subsystems. This article shows how STPA could inform the design of the peer-to-peer voting system and how SD could be used to examine the tradeoff of investments in redundancy versus the expected level of achieved resilience.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"53-60"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Security Needs Systems Engineering 安全如何需要系统工程
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12543
Mark W. Winstead

Peter Neumann once noted that complex systems are not like snapping Lego pieces together, rather each piece added can transmogrify its modular interface and upset the existing structure. The effect for security can be a system weaker than its weakest link – moreover, addressing a security concern can disrupt achieving other emergent properties (e.g., safety). The article addresses these challenges by casting security as a system problem, where the security engineering must not be done stove piped from system engineering. The discussion within also addresses the role of systems thinking and the need for evidence-based assurance overseen by systems engineering.

Peter Neumann曾经指出,复杂的系统不像把乐高积木拼在一起,而是每增加一块都可以改变它的模块化界面,颠覆现有的结构。对安全的影响可能是一个比其最薄弱环节更弱的系统——此外,解决安全问题可能会破坏实现其他紧急属性(例如,安全性)。本文通过将安全性作为一个系统问题来解决这些挑战,其中安全性工程不能从系统工程中分离出来。本文还讨论了系统思考的角色以及由系统工程监督的基于证据的保证的需要。
{"title":"How Security Needs Systems Engineering","authors":"Mark W. Winstead","doi":"10.1002/inst.12543","DOIUrl":"10.1002/inst.12543","url":null,"abstract":"<div>\u0000 \u0000 <p>Peter Neumann once noted that complex systems are not like snapping Lego pieces together, rather each piece added can transmogrify its modular interface and upset the existing structure. The effect for security can be a system weaker than its weakest link – moreover, addressing a security concern can disrupt achieving other emergent properties (e.g., safety). The article addresses these challenges by casting security as a system problem, where the security engineering must not be done stove piped from system engineering. The discussion within also addresses the role of systems thinking and the need for evidence-based assurance overseen by systems engineering.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"44-47"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI for System Security Design: A Good Tool or a Dangerous Weapon? AI系统安全设计:好工具还是危险武器?
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12546
Beth Wilson

As artificial intelligence (AI) tools have become more popular, industries wrestle with their effective use in the workplace. With promises of increasing efficiency and reducing complexity, it is tempting for systems engineers to use AI tools to quickly generate security requirements and skip engagement with systems security practitioners. The proliferation of AI tools that have been trained with security controls invites misguided approaches that deliver systems that are not secure in the operational environment. AI literacy is important to understand both the benefits and the limitations of AI to use it ethically and effectively.

随着人工智能(AI)工具变得越来越流行,各行各业都在努力解决它们在工作场所的有效使用问题。随着提高效率和降低复杂性的承诺,系统工程师很容易使用人工智能工具来快速生成安全需求,并跳过与系统安全从业者的接触。经过安全控制培训的人工智能工具的激增导致了错误的方法,这些方法交付的系统在操作环境中不安全。人工智能素养对于理解人工智能的好处和局限性,从而合乎道德和有效地使用它非常重要。
{"title":"AI for System Security Design: A Good Tool or a Dangerous Weapon?","authors":"Beth Wilson","doi":"10.1002/inst.12546","DOIUrl":"10.1002/inst.12546","url":null,"abstract":"<div>\u0000 \u0000 <p>As artificial intelligence (AI) tools have become more popular, industries wrestle with their effective use in the workplace. With promises of increasing efficiency and reducing complexity, it is tempting for systems engineers to use AI tools to quickly generate security requirements and skip engagement with systems security practitioners. The proliferation of AI tools that have been trained with security controls invites misguided approaches that deliver systems that are not secure in the operational environment. AI literacy is important to understand both the benefits and the limitations of AI to use it ethically and effectively.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"61-65"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting Mission Critical Systems The Need for a Shift in Culture, Strategy, and Process 保护关键任务系统:文化、战略和流程转变的必要性
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12539
Ron Ross, Kymie Tan

In contrast to the traditional compliance-based approach to protecting space systems using the NIST Risk Management Framework (RMF), a trustworthy secure systems engineering approach as described in the NIST Special Publication 800-160 is proposed as a viable and effective alternative. This paper discusses the issues and concerns with the traditional approach to cybersecurity and how engineering-based approaches measurably improve security, allowing a greater return on investment for mission critical operational environments like those that support space missions. The paper will show that there are several facets to the cybersecurity problem that go beyond the technical to include culture, process, and policy, and explain why a change in strategy and approach is necessary to address the modern sophisticated cyber adversary operating in a world of highly complex and evolving systems. Insights from a project where a NIST SP 800-160-based engineering approach was applied to secure a space mission will be discussed. The early lessons not only illuminate the benefits of security systems engineering, but also the effect of culture, policy and process on building resilience into mission critical systems.

与使用NIST风险管理框架(RMF)保护空间系统的传统基于合规性的方法相比,NIST特别出版物800-160中描述的可信赖的安全系统工程方法被提议为一种可行且有效的替代方案。本文讨论了传统网络安全方法的问题和关注点,以及基于工程的方法如何显著提高安全性,从而为支持太空任务的关键任务操作环境提供更大的投资回报。本文将表明,网络安全问题的几个方面超越了技术层面,包括文化、流程和政策,并解释了为什么在一个高度复杂和不断发展的系统世界中,需要改变战略和方法来应对现代复杂的网络对手。将讨论应用基于NIST SP 800-160的工程方法来确保太空任务的项目的见解。早期的经验教训不仅阐明了安全系统工程的好处,而且还说明了文化、政策和过程对在关键任务系统中建立弹性的影响。
{"title":"Protecting Mission Critical Systems The Need for a Shift in Culture, Strategy, and Process","authors":"Ron Ross,&nbsp;Kymie Tan","doi":"10.1002/inst.12539","DOIUrl":"10.1002/inst.12539","url":null,"abstract":"<div>\u0000 \u0000 <p>In contrast to the traditional compliance-based approach to protecting space systems using the NIST Risk Management Framework (RMF), a trustworthy secure systems engineering approach as described in the NIST Special Publication 800-160 is proposed as a viable and effective alternative. This paper discusses the issues and concerns with the traditional approach to cybersecurity and how engineering-based approaches measurably improve security, allowing a greater return on investment for mission critical operational environments like those that support space missions. The paper will show that there are several facets to the cybersecurity problem that go beyond the technical to include culture, process, and policy, and explain why a change in strategy and approach is necessary to address the modern sophisticated cyber adversary operating in a world of highly complex and evolving systems. Insights from a project where a NIST SP 800-160-based engineering approach was applied to secure a space mission will be discussed. The early lessons not only illuminate the benefits of security systems engineering, but also the effect of culture, policy and process on building resilience into mission critical systems.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"15-22"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guide to Security Needs and Requirements – Making Security a Functional Requirement 保安需要和要求指南-使保安成为功能要求
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12540
Beth Wilson

The INCOSE Systems Security Working Group completed a 2-year project to create a Guide to Security Needs and Requirements targeting both the systems engineering practitioner and the systems security practitioner to help them collaboratively define security needs and requirements that result in a secure system in operation. Starting with a set of anti-patterns for security requirements, we identified existing tactics that have not produced secure systems in the operational environment. The team then identified an approach to perform needs-oriented, loss-driven, capability-based analysis across the systems engineering activities. The result is a set of need statements capturing the stakeholder expectations concerning security and a set of functional requirements defining what the system must do to address those needs. Defining security as a functional requirement helps us design a system that can prepare for, defend against, and recover from adversity to achieve and sustain mission success.

INCOSE系统安全工作小组完成了一项为期两年的项目,以创建针对系统工程从业者和系统安全从业者的安全需求和需求指南,以帮助他们协作定义安全需求和需求,从而实现安全系统的运行。从安全需求的一组反模式开始,我们确定了在操作环境中没有产生安全系统的现有策略。然后,团队确定了一种方法来跨系统工程活动执行面向需求、损失驱动、基于能力的分析。结果是一组需求陈述,捕获涉众对安全性的期望,以及一组功能性需求,定义系统必须做什么来满足这些需求。将安全性定义为功能需求有助于我们设计一个系统,该系统可以为逆境做好准备、防御并从逆境中恢复,从而实现并维持任务的成功。
{"title":"Guide to Security Needs and Requirements – Making Security a Functional Requirement","authors":"Beth Wilson","doi":"10.1002/inst.12540","DOIUrl":"10.1002/inst.12540","url":null,"abstract":"<div>\u0000 \u0000 <p>The INCOSE Systems Security Working Group completed a 2-year project to create a Guide to Security Needs and Requirements targeting both the systems engineering practitioner and the systems security practitioner to help them collaboratively define security needs and requirements that result in a secure system in operation. Starting with a set of anti-patterns for security requirements, we identified existing tactics that have not produced secure systems in the operational environment. The team then identified an approach to perform needs-oriented, loss-driven, capability-based analysis across the systems engineering activities. The result is a set of need statements capturing the stakeholder expectations concerning security and a set of functional requirements defining what the system must do to address those needs. Defining security as a functional requirement helps us design a system that can prepare for, defend against, and recover from adversity to achieve and sustain mission success.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"23-28"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Illuminating Systems Security Through Case Studies – Much More than Controls 通过案例研究照亮系统安全-远远超过控制
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12544
Beth Wilson

While systems security is a quality attribute (previously referred to as specialty engineering), learning systems security is essential for all systems engineers. Learning about system security can be a challenge especially when the focus is on security controls or admiring attack vectors. Case studies are a powerful way to see the real-world application of complex concepts. Reviewing cyber-attack case studies provides a captivating approach to examine security challenges and failures holistically using systems thinking, consider the technical concerns, business decisions, and human behaviors that made the attack possible, and explore systems security concepts from a systems engineering perspective.

虽然系统安全性是一个质量属性(以前称为专业工程),但学习系统安全性对所有系统工程师来说都是必不可少的。学习系统安全性可能是一项挑战,特别是当重点放在安全控制或识别攻击向量时。案例研究是了解复杂概念在现实世界中的应用的有力方法。回顾网络攻击案例研究提供了一种引人入胜的方法,可以使用系统思维全面地检查安全挑战和失败,考虑使攻击成为可能的技术关注点、业务决策和人类行为,并从系统工程的角度探索系统安全概念。
{"title":"Illuminating Systems Security Through Case Studies – Much More than Controls","authors":"Beth Wilson","doi":"10.1002/inst.12544","DOIUrl":"10.1002/inst.12544","url":null,"abstract":"<div>\u0000 \u0000 <p>While systems security is a quality attribute (previously referred to as specialty engineering), learning systems security is essential for all systems engineers. Learning about system security can be a challenge especially when the focus is on security controls or admiring attack vectors. Case studies are a powerful way to see the real-world application of complex concepts. Reviewing cyber-attack case studies provides a captivating approach to examine security challenges and failures holistically using systems thinking, consider the technical concerns, business decisions, and human behaviors that made the attack possible, and explore systems security concepts from a systems engineering perspective.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"48-52"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FROM THE EDITOR-IN-CHIEF 来自总编辑
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12536
William Miller
{"title":"FROM THE EDITOR-IN-CHIEF","authors":"William Miller","doi":"10.1002/inst.12536","DOIUrl":"10.1002/inst.12536","url":null,"abstract":"","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"6-7"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model-Based Approach for Privacy Risk Mitigation Integrating Systems Engineering with System-Theoretic Process Analysis 集成系统工程与系统理论过程分析的基于模型的隐私风险缓解方法
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12542
David Hetherington

Certain commercial operations, their systems, and their employees need to operate in hostile or semi-hostile environments. The physical environment may be challenging, but often an unstable political/social environment may be a greater challenge than any temperature or weather extremes. Such an unstable political environment may present rapidly changing threats to employee security. Even if local citizens in the immediate area are supportive, transnational violent gangs may be operating nearby. How do we design overall technology and human systems that can resiliently persevere in such an unstable environment?

Some organizations will reflexively implement a walled-off, fenced, and protected environment for their employees. While this sort of physical protection will be helpful to some extent, if human relationships with the local community are poor or nonexistent, the overall security of the installation will be fragile. Some organizations will deliberately move in the opposite direction, proactively sending their employees out into the community to interact, talk to local citizens, and build human relationships – even when doing so represents a significant degree of physical and personal risk for those employees.

How do we support employees that we are deliberately thrusting into such a risky and unstable environment? For their own safety, we want those employees to communicate as much as possible with the local citizens. We want them to be aware of “chatter” in local social media. On the other hand, we want help them keep their actual personal identity details as protected as possible. Failed social interactions can have lethal consequences. Inadvertently leaked personal data about family members could result in those family members being subject to threats and intimidation in their home location.

In this article, we examine the design of a digital personal communications device designed to achieve these goals and demonstrate the use of System-Theoretic Process Analysis (STPA) in the analysis of a proposed design. Along the way, we will also demonstrate a model-based approach to the design work which represents the recently released standard SAE J3307 “System Theoretic Process Analysis (STPA) Standard for All Industries” (J3307_202503, 2025) which specifies an auditable workflow for the STPA methodology originally described in the STPA Handbook.

某些商业操作、它们的系统和它们的雇员需要在敌对或半敌对的环境中操作。自然环境可能具有挑战性,但通常不稳定的政治/社会环境可能比任何温度或极端天气都更具挑战性。这种不稳定的政治环境可能会给员工的安全带来快速变化的威胁。即使邻近地区的当地居民表示支持,跨国暴力团伙也可能在附近活动。我们如何设计整体技术和人类系统,使其能够在如此不稳定的环境中保持弹性?一些组织会条件反射性地为他们的员工实现一个隔离、围栏和受保护的环境。虽然这种物理保护在某种程度上是有帮助的,但如果与当地社区的人际关系很差或根本不存在,那么装置的整体安全性将是脆弱的。有些组织会故意采取相反的做法,主动派遣员工到社区去互动,与当地居民交谈,建立人际关系——即使这样做对这些员工来说意味着很大程度的身体和个人风险。我们如何支持那些被我们故意推入如此危险和不稳定环境的员工?为了他们自身的安全,我们希望这些员工尽可能多地与当地居民沟通。我们希望他们能注意到当地社交媒体上的“闲谈”。另一方面,我们希望帮助他们尽可能地保护他们实际的个人身份信息。失败的社交互动会带来致命的后果。无意中泄露的家庭成员的个人信息可能导致这些家庭成员在其家乡受到威胁和恐吓。在本文中,我们研究了一种旨在实现这些目标的数字个人通信设备的设计,并演示了系统理论过程分析(STPA)在分析建议设计中的使用。在此过程中,我们还将展示一种基于模型的设计工作方法,该方法代表了最近发布的SAE J3307标准“所有行业的系统理论过程分析(STPA)标准”(J3307_202503, 2025),该标准规定了最初在STPA手册中描述的STPA方法的可审计工作流程。
{"title":"A Model-Based Approach for Privacy Risk Mitigation Integrating Systems Engineering with System-Theoretic Process Analysis","authors":"David Hetherington","doi":"10.1002/inst.12542","DOIUrl":"10.1002/inst.12542","url":null,"abstract":"<div>\u0000 \u0000 <p>Certain commercial operations, their systems, and their employees need to operate in hostile or semi-hostile environments. The physical environment may be challenging, but often an unstable political/social environment may be a greater challenge than any temperature or weather extremes. Such an unstable political environment may present rapidly changing threats to employee security. Even if local citizens in the immediate area are supportive, transnational violent gangs may be operating nearby. How do we design overall technology and human systems that can resiliently persevere in such an unstable environment?</p>\u0000 <p>Some organizations will reflexively implement a walled-off, fenced, and protected environment for their employees. While this sort of physical protection will be helpful to some extent, if human relationships with the local community are poor or nonexistent, the overall security of the installation will be fragile. Some organizations will deliberately move in the opposite direction, proactively sending their employees out into the community to interact, talk to local citizens, and build human relationships – even when doing so represents a significant degree of physical and personal risk for those employees.</p>\u0000 <p>How do we support employees that we are deliberately thrusting into such a risky and unstable environment? For their own safety, we want those employees to communicate as much as possible with the local citizens. We want them to be aware of “chatter” in local social media. On the other hand, we want help them keep their actual personal identity details as protected as possible. Failed social interactions can have lethal consequences. Inadvertently leaked personal data about family members could result in those family members being subject to threats and intimidation in their home location.</p>\u0000 <p>In this article, we examine the design of a digital personal communications device designed to achieve these goals and demonstrate the use of System-Theoretic Process Analysis (STPA) in the analysis of a proposed design. Along the way, we will also demonstrate a model-based approach to the design work which represents the recently released standard SAE J3307 “System Theoretic Process Analysis (STPA) Standard for All Industries” <i>(J3307_202503, 2025)</i> which specifies an auditable workflow for the STPA methodology originally described in the STPA Handbook.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"35-43"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Insight
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1