首页 > 最新文献

Insight最新文献

英文 中文
Governance and Resilience: A Holistic Approach to Systems Security in Complex and Chaotic Environments 治理和弹性:复杂和混乱环境中系统安全的整体方法
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12541
Sue Caskey, Adam Williams

A systems governance approach emphasizes a holistic perspective that identifies and navigates the interdependencies and conflicts between security and operational needs. Governance is defined as a collection of metasystems that provide the necessary constraints and processes to support, steer, adapt, transform, and sustain a system (Keating et al. 2022). Utilizing the Cynefin framework, which distinguishes between simple, complicated, complex, and chaotic environments (Snowden and Boone 2007), the article highlights the challenges faced by nuclear power plants in predatory contexts and the importance of integrating security objectives into governance frameworks.

By incorporating security as a fundamental aspect of governance, the article underscores its significance for persistence, adaptation, and transformation in the face of uncertainty. Additionally, it introduces key heuristics of systems security, such as the importance of context, knowledge-based decision-making, and organization-specific sociological factors (Williams and Caskey 2024). Ultimately, this work provides valuable insights into enhancing resilient operations in complex environments by reinforcing the connection between effective governance and security in systems engineering.

系统治理方法强调识别和导航安全性与操作需求之间的相互依赖关系和冲突的整体视角。治理被定义为提供必要的约束和过程来支持、引导、适应、转换和维持系统的元系统的集合(Keating et al. 2022)。利用区分简单、复杂、复杂和混乱环境的Cynefin框架(Snowden and Boone 2007),文章强调了核电厂在掠夺性背景下面临的挑战,以及将安全目标整合到治理框架中的重要性。通过将安全性作为治理的一个基本方面,本文强调了它在面对不确定性时对持久性、适应性和转换的重要性。此外,它还介绍了系统安全的关键启发式,例如上下文的重要性、基于知识的决策和组织特定的社会学因素(Williams and Caskey 2024)。最终,这项工作通过加强系统工程中有效治理和安全之间的联系,为在复杂环境中增强弹性操作提供了有价值的见解。
{"title":"Governance and Resilience: A Holistic Approach to Systems Security in Complex and Chaotic Environments","authors":"Sue Caskey,&nbsp;Adam Williams","doi":"10.1002/inst.12541","DOIUrl":"10.1002/inst.12541","url":null,"abstract":"<div>\u0000 \u0000 <p>A systems governance approach emphasizes a holistic perspective that identifies and navigates the interdependencies and conflicts between security and operational needs. Governance is defined as a collection of metasystems that provide the necessary constraints and processes to support, steer, adapt, transform, and sustain a system (Keating et al. 2022). Utilizing the Cynefin framework, which distinguishes between simple, complicated, complex, and chaotic environments (Snowden and Boone 2007), the article highlights the challenges faced by nuclear power plants in predatory contexts and the importance of integrating security objectives into governance frameworks.</p>\u0000 <p>By incorporating security as a fundamental aspect of governance, the article underscores its significance for persistence, adaptation, and transformation in the face of uncertainty. Additionally, it introduces key heuristics of systems security, such as the importance of context, knowledge-based decision-making, and organization-specific sociological factors (Williams and Caskey 2024). Ultimately, this work provides valuable insights into enhancing resilient operations in complex environments by reinforcing the connection between effective governance and security in systems engineering.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"29-34"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attitudes 的态度
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12537
Rick Dove

Digital controls and internet connectivity have fostered a hostile predatory environment for modern systems. Organized crime and nation state interests are naturally compelled to exploit these readily accessible opportunities for financial and political advantages. Systems engineering is being called upon to reorient its priorities accordingly. INCOSE's Future of Systems Engineering (FuSE) to realize the Systems Engineering Vision 2035 has a security-focused activity exploring what this reorientation might be. This article shares some of that thinking, exposes some issues in need of more thinking, and suggests why and how all systems engineers could and should be part of this thinking.

数字控制和互联网连接为现代系统营造了一个充满敌意的掠夺性环境。有组织犯罪和民族国家的利益自然会被迫利用这些唾手可得的机会来获取经济和政治优势。系统工程正被要求相应地重新调整其优先事项。为了实现2035年系统工程愿景,INCOSE的系统工程未来(FuSE)有一个以安全为重点的活动,探索这种重新定位可能是什么。本文分享了其中的一些想法,揭示了一些需要更多思考的问题,并建议为什么以及如何所有系统工程师都可以并且应该成为这种想法的一部分。
{"title":"Attitudes","authors":"Rick Dove","doi":"10.1002/inst.12537","DOIUrl":"10.1002/inst.12537","url":null,"abstract":"<div>\u0000 \u0000 <p>Digital controls and internet connectivity have fostered a hostile predatory environment for modern systems. Organized crime and nation state interests are naturally compelled to exploit these readily accessible opportunities for financial and political advantages. Systems engineering is being called upon to reorient its priorities accordingly. INCOSE's Future of Systems Engineering (FuSE) to realize the Systems Engineering Vision 2035 has a security-focused activity exploring what this reorientation might be. This article shares some of that thinking, exposes some issues in need of more thinking, and suggests why and how all systems engineers could and should be part of this thinking.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"8-10"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Systems Thinking to Advance Security in the Future of Systems Engineering (FuSE), a Progress Report 使用系统思维在系统工程(FuSE)的未来推进安全,一份进展报告
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12538
Systems Security Working Group

The Security in the Future of Systems Engineering (FuSE) team has made significant progress since its launch to realize the INCOSE vision described in Systems Engineering Vision 2035 (INCOSE 2021). The output products to date promote improved systems engineering practices to achieve security as a foundational perspective. The systems thinkers on this team have performed holistic analysis of current practices to expose existing anti-patterns and mental models that informed the transformation to future practices that can yield desired results and achieve the 2035 vision. Needs-oriented, loss-driven, capability-based analysis to define security strategies that become functional requirements promotes stakeholder alignment of the security vision and leads to effective security tactics and techniques that collectively achieve the security strategies. The result is a system that achieves functional perseverance in a hostile predatory environment. The work products completed so far and those in progress reflect our efforts to transition practices to a future where our systems are designed to achieve and sustain security as an intentional capability of the system throughout its lifecycle.

自启动以来,系统工程未来安全(FuSE)团队在实现系统工程愿景2035 (INCOSE 2021)中描述的INCOSE愿景方面取得了重大进展。迄今为止的输出产品促进了改进的系统工程实践,以实现安全性作为一个基本的观点。这个团队中的系统思考者已经对当前的实践进行了全面的分析,以揭示现有的反模式和心智模型,这些模式和心智模型为未来的实践提供了信息,这些实践可以产生预期的结果,并实现2035年的愿景。以需求为导向、损失驱动、基于功能的分析来定义安全策略,这些策略将成为功能需求,从而促进涉众对安全愿景的一致,并导致有效的安全策略和技术,从而共同实现安全策略。结果是一个系统在敌对的掠夺性环境中实现了功能性的坚持。到目前为止完成的工作产品和正在进行的工作产品反映了我们将实践过渡到未来的努力,在未来,我们的系统被设计为在其整个生命周期中实现并维持安全性作为系统的有意能力。
{"title":"Using Systems Thinking to Advance Security in the Future of Systems Engineering (FuSE), a Progress Report","authors":"Systems Security Working Group","doi":"10.1002/inst.12538","DOIUrl":"10.1002/inst.12538","url":null,"abstract":"<div>\u0000 \u0000 <p>The Security in the Future of Systems Engineering (FuSE) team has made significant progress since its launch to realize the INCOSE vision described in <i>Systems Engineering Vision 2035</i> (INCOSE 2021). The output products to date promote improved systems engineering practices to achieve security as a foundational perspective. The systems thinkers on this team have performed holistic analysis of current practices to expose existing anti-patterns and mental models that informed the transformation to future practices that can yield desired results and achieve the 2035 vision. Needs-oriented, loss-driven, capability-based analysis to define security strategies that become functional requirements promotes stakeholder alignment of the security vision and leads to effective security tactics and techniques that collectively achieve the security strategies. The result is a system that achieves functional perseverance in a hostile predatory environment. The work products completed so far and those in progress reflect our efforts to transition practices to a future where our systems are designed to achieve and sustain security as an intentional capability of the system throughout its lifecycle.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"11-14"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When Malicious Actors Control Your Subsystems: A Systems Engineering Approach to Functional Perseverance 当恶意行为者控制你的子系统:一种功能坚持的系统工程方法
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12545
David Hetherington, Ivan Taylor

Security in modern engineered systems is not merely an added layer of protection but a prerequisite for system functionality. As systems engineers navigate the evolving security landscape, they must prioritize functional perseverance, the ability of a system to maintain operational integrity despite adversarial threats. This article examines a possible method for using system-theoretic process analysis (STPA) and system dynamics (SD) to enhance security-aware system engineering.

The approach shown is inspired by a 1982 paper called “The Byzantine Generals Problem” and is a peer-to-peer voting design that avoids single points of failure. In particular, we propose a system analysis and design approach that would allow the construction of a system capable of using peer-to-peer self-policing to detect an intruder that has already penetrated the security perimeter of the system and corrupted one or more of the subsystems. This article shows how STPA could inform the design of the peer-to-peer voting system and how SD could be used to examine the tradeoff of investments in redundancy versus the expected level of achieved resilience.

在现代工程系统中,安全不仅仅是一个额外的保护层,而且是系统功能的先决条件。当系统工程师在不断发展的安全环境中导航时,他们必须优先考虑功能持久性,即系统在面对敌对威胁时保持操作完整性的能力。本文探讨了一种使用系统理论过程分析(STPA)和系统动力学(SD)来增强安全感知系统工程的可能方法。所展示的方法受到1982年一篇名为“拜占庭将军问题”的论文的启发,是一种避免单点故障的点对点投票设计。特别是,我们提出了一种系统分析和设计方法,该方法允许构建一个能够使用点对点自我监管的系统,以检测已经渗透到系统安全边界并损坏一个或多个子系统的入侵者。本文展示了STPA如何为点对点投票系统的设计提供信息,以及如何使用SD来检查冗余投资与预期实现弹性水平之间的权衡。
{"title":"When Malicious Actors Control Your Subsystems: A Systems Engineering Approach to Functional Perseverance","authors":"David Hetherington,&nbsp;Ivan Taylor","doi":"10.1002/inst.12545","DOIUrl":"10.1002/inst.12545","url":null,"abstract":"<div>\u0000 \u0000 <p>Security in modern engineered systems is not merely an added layer of protection but a prerequisite for system functionality. As systems engineers navigate the evolving security landscape, they must prioritize functional perseverance, the ability of a system to maintain operational integrity despite adversarial threats. This article examines a possible method for using system-theoretic process analysis (STPA) and system dynamics (SD) to enhance security-aware system engineering.</p>\u0000 <p>The approach shown is inspired by a 1982 paper called “The Byzantine Generals Problem” and is a peer-to-peer voting design that avoids single points of failure. In particular, we propose a system analysis and design approach that would allow the construction of a system capable of using peer-to-peer self-policing to detect an intruder that has already penetrated the security perimeter of the system and corrupted one or more of the subsystems. This article shows how STPA could inform the design of the peer-to-peer voting system and how SD could be used to examine the tradeoff of investments in redundancy versus the expected level of achieved resilience.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"53-60"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Security Needs Systems Engineering 安全如何需要系统工程
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12543
Mark W. Winstead

Peter Neumann once noted that complex systems are not like snapping Lego pieces together, rather each piece added can transmogrify its modular interface and upset the existing structure. The effect for security can be a system weaker than its weakest link – moreover, addressing a security concern can disrupt achieving other emergent properties (e.g., safety). The article addresses these challenges by casting security as a system problem, where the security engineering must not be done stove piped from system engineering. The discussion within also addresses the role of systems thinking and the need for evidence-based assurance overseen by systems engineering.

Peter Neumann曾经指出,复杂的系统不像把乐高积木拼在一起,而是每增加一块都可以改变它的模块化界面,颠覆现有的结构。对安全的影响可能是一个比其最薄弱环节更弱的系统——此外,解决安全问题可能会破坏实现其他紧急属性(例如,安全性)。本文通过将安全性作为一个系统问题来解决这些挑战,其中安全性工程不能从系统工程中分离出来。本文还讨论了系统思考的角色以及由系统工程监督的基于证据的保证的需要。
{"title":"How Security Needs Systems Engineering","authors":"Mark W. Winstead","doi":"10.1002/inst.12543","DOIUrl":"10.1002/inst.12543","url":null,"abstract":"<div>\u0000 \u0000 <p>Peter Neumann once noted that complex systems are not like snapping Lego pieces together, rather each piece added can transmogrify its modular interface and upset the existing structure. The effect for security can be a system weaker than its weakest link – moreover, addressing a security concern can disrupt achieving other emergent properties (e.g., safety). The article addresses these challenges by casting security as a system problem, where the security engineering must not be done stove piped from system engineering. The discussion within also addresses the role of systems thinking and the need for evidence-based assurance overseen by systems engineering.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"44-47"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI for System Security Design: A Good Tool or a Dangerous Weapon? AI系统安全设计:好工具还是危险武器?
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12546
Beth Wilson

As artificial intelligence (AI) tools have become more popular, industries wrestle with their effective use in the workplace. With promises of increasing efficiency and reducing complexity, it is tempting for systems engineers to use AI tools to quickly generate security requirements and skip engagement with systems security practitioners. The proliferation of AI tools that have been trained with security controls invites misguided approaches that deliver systems that are not secure in the operational environment. AI literacy is important to understand both the benefits and the limitations of AI to use it ethically and effectively.

随着人工智能(AI)工具变得越来越流行,各行各业都在努力解决它们在工作场所的有效使用问题。随着提高效率和降低复杂性的承诺,系统工程师很容易使用人工智能工具来快速生成安全需求,并跳过与系统安全从业者的接触。经过安全控制培训的人工智能工具的激增导致了错误的方法,这些方法交付的系统在操作环境中不安全。人工智能素养对于理解人工智能的好处和局限性,从而合乎道德和有效地使用它非常重要。
{"title":"AI for System Security Design: A Good Tool or a Dangerous Weapon?","authors":"Beth Wilson","doi":"10.1002/inst.12546","DOIUrl":"10.1002/inst.12546","url":null,"abstract":"<div>\u0000 \u0000 <p>As artificial intelligence (AI) tools have become more popular, industries wrestle with their effective use in the workplace. With promises of increasing efficiency and reducing complexity, it is tempting for systems engineers to use AI tools to quickly generate security requirements and skip engagement with systems security practitioners. The proliferation of AI tools that have been trained with security controls invites misguided approaches that deliver systems that are not secure in the operational environment. AI literacy is important to understand both the benefits and the limitations of AI to use it ethically and effectively.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"61-65"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting Mission Critical Systems The Need for a Shift in Culture, Strategy, and Process 保护关键任务系统:文化、战略和流程转变的必要性
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12539
Ron Ross, Kymie Tan

In contrast to the traditional compliance-based approach to protecting space systems using the NIST Risk Management Framework (RMF), a trustworthy secure systems engineering approach as described in the NIST Special Publication 800-160 is proposed as a viable and effective alternative. This paper discusses the issues and concerns with the traditional approach to cybersecurity and how engineering-based approaches measurably improve security, allowing a greater return on investment for mission critical operational environments like those that support space missions. The paper will show that there are several facets to the cybersecurity problem that go beyond the technical to include culture, process, and policy, and explain why a change in strategy and approach is necessary to address the modern sophisticated cyber adversary operating in a world of highly complex and evolving systems. Insights from a project where a NIST SP 800-160-based engineering approach was applied to secure a space mission will be discussed. The early lessons not only illuminate the benefits of security systems engineering, but also the effect of culture, policy and process on building resilience into mission critical systems.

与使用NIST风险管理框架(RMF)保护空间系统的传统基于合规性的方法相比,NIST特别出版物800-160中描述的可信赖的安全系统工程方法被提议为一种可行且有效的替代方案。本文讨论了传统网络安全方法的问题和关注点,以及基于工程的方法如何显著提高安全性,从而为支持太空任务的关键任务操作环境提供更大的投资回报。本文将表明,网络安全问题的几个方面超越了技术层面,包括文化、流程和政策,并解释了为什么在一个高度复杂和不断发展的系统世界中,需要改变战略和方法来应对现代复杂的网络对手。将讨论应用基于NIST SP 800-160的工程方法来确保太空任务的项目的见解。早期的经验教训不仅阐明了安全系统工程的好处,而且还说明了文化、政策和过程对在关键任务系统中建立弹性的影响。
{"title":"Protecting Mission Critical Systems The Need for a Shift in Culture, Strategy, and Process","authors":"Ron Ross,&nbsp;Kymie Tan","doi":"10.1002/inst.12539","DOIUrl":"10.1002/inst.12539","url":null,"abstract":"<div>\u0000 \u0000 <p>In contrast to the traditional compliance-based approach to protecting space systems using the NIST Risk Management Framework (RMF), a trustworthy secure systems engineering approach as described in the NIST Special Publication 800-160 is proposed as a viable and effective alternative. This paper discusses the issues and concerns with the traditional approach to cybersecurity and how engineering-based approaches measurably improve security, allowing a greater return on investment for mission critical operational environments like those that support space missions. The paper will show that there are several facets to the cybersecurity problem that go beyond the technical to include culture, process, and policy, and explain why a change in strategy and approach is necessary to address the modern sophisticated cyber adversary operating in a world of highly complex and evolving systems. Insights from a project where a NIST SP 800-160-based engineering approach was applied to secure a space mission will be discussed. The early lessons not only illuminate the benefits of security systems engineering, but also the effect of culture, policy and process on building resilience into mission critical systems.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"15-22"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guide to Security Needs and Requirements – Making Security a Functional Requirement 保安需要和要求指南-使保安成为功能要求
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12540
Beth Wilson

The INCOSE Systems Security Working Group completed a 2-year project to create a Guide to Security Needs and Requirements targeting both the systems engineering practitioner and the systems security practitioner to help them collaboratively define security needs and requirements that result in a secure system in operation. Starting with a set of anti-patterns for security requirements, we identified existing tactics that have not produced secure systems in the operational environment. The team then identified an approach to perform needs-oriented, loss-driven, capability-based analysis across the systems engineering activities. The result is a set of need statements capturing the stakeholder expectations concerning security and a set of functional requirements defining what the system must do to address those needs. Defining security as a functional requirement helps us design a system that can prepare for, defend against, and recover from adversity to achieve and sustain mission success.

INCOSE系统安全工作小组完成了一项为期两年的项目,以创建针对系统工程从业者和系统安全从业者的安全需求和需求指南,以帮助他们协作定义安全需求和需求,从而实现安全系统的运行。从安全需求的一组反模式开始,我们确定了在操作环境中没有产生安全系统的现有策略。然后,团队确定了一种方法来跨系统工程活动执行面向需求、损失驱动、基于能力的分析。结果是一组需求陈述,捕获涉众对安全性的期望,以及一组功能性需求,定义系统必须做什么来满足这些需求。将安全性定义为功能需求有助于我们设计一个系统,该系统可以为逆境做好准备、防御并从逆境中恢复,从而实现并维持任务的成功。
{"title":"Guide to Security Needs and Requirements – Making Security a Functional Requirement","authors":"Beth Wilson","doi":"10.1002/inst.12540","DOIUrl":"10.1002/inst.12540","url":null,"abstract":"<div>\u0000 \u0000 <p>The INCOSE Systems Security Working Group completed a 2-year project to create a Guide to Security Needs and Requirements targeting both the systems engineering practitioner and the systems security practitioner to help them collaboratively define security needs and requirements that result in a secure system in operation. Starting with a set of anti-patterns for security requirements, we identified existing tactics that have not produced secure systems in the operational environment. The team then identified an approach to perform needs-oriented, loss-driven, capability-based analysis across the systems engineering activities. The result is a set of need statements capturing the stakeholder expectations concerning security and a set of functional requirements defining what the system must do to address those needs. Defining security as a functional requirement helps us design a system that can prepare for, defend against, and recover from adversity to achieve and sustain mission success.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"23-28"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Illuminating Systems Security Through Case Studies – Much More than Controls 通过案例研究照亮系统安全-远远超过控制
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12544
Beth Wilson

While systems security is a quality attribute (previously referred to as specialty engineering), learning systems security is essential for all systems engineers. Learning about system security can be a challenge especially when the focus is on security controls or admiring attack vectors. Case studies are a powerful way to see the real-world application of complex concepts. Reviewing cyber-attack case studies provides a captivating approach to examine security challenges and failures holistically using systems thinking, consider the technical concerns, business decisions, and human behaviors that made the attack possible, and explore systems security concepts from a systems engineering perspective.

虽然系统安全性是一个质量属性(以前称为专业工程),但学习系统安全性对所有系统工程师来说都是必不可少的。学习系统安全性可能是一项挑战,特别是当重点放在安全控制或识别攻击向量时。案例研究是了解复杂概念在现实世界中的应用的有力方法。回顾网络攻击案例研究提供了一种引人入胜的方法,可以使用系统思维全面地检查安全挑战和失败,考虑使攻击成为可能的技术关注点、业务决策和人类行为,并从系统工程的角度探索系统安全概念。
{"title":"Illuminating Systems Security Through Case Studies – Much More than Controls","authors":"Beth Wilson","doi":"10.1002/inst.12544","DOIUrl":"10.1002/inst.12544","url":null,"abstract":"<div>\u0000 \u0000 <p>While systems security is a quality attribute (previously referred to as specialty engineering), learning systems security is essential for all systems engineers. Learning about system security can be a challenge especially when the focus is on security controls or admiring attack vectors. Case studies are a powerful way to see the real-world application of complex concepts. Reviewing cyber-attack case studies provides a captivating approach to examine security challenges and failures holistically using systems thinking, consider the technical concerns, business decisions, and human behaviors that made the attack possible, and explore systems security concepts from a systems engineering perspective.</p>\u0000 </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"48-52"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FROM THE EDITOR-IN-CHIEF 来自总编辑
IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION Pub Date : 2025-07-07 DOI: 10.1002/inst.12536
William Miller
{"title":"FROM THE EDITOR-IN-CHIEF","authors":"William Miller","doi":"10.1002/inst.12536","DOIUrl":"10.1002/inst.12536","url":null,"abstract":"","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"6-7"},"PeriodicalIF":1.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144573517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Insight
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1