Socio-technical systems are an interplay of social (humans and organizations) and technical components interacting with one an- other to achieve their objectives. Security is a central issue in such com- plex systems, and it cannot be tackled only through technical mecha- nisms: the encryption of sensitive data while being transmitted, does not assure that the receiver will not disclose them to unauthorized parties. Therefore, dealing with security in socio-technical systems requires an analysis: (i) from a social and organizational perspective, to elicit the objectives and security requirements of each component; (ii) from a pro- cedural perspective, to define how the actors behave and interact with each other. But, socio-technical systems need to adapt to changes of the external environment, making the need to deal with security a prob- lem that has to be faced during all the systems’ life-cycle. We propose an iterative and incremental process to elicit security requirements and verify the socio-technical system’s compliance with such requirements throughout the systems’ life cycle.

Threat Analysis in Goal-Oriented Security Requirements Modelling

Paja, Elda;Dalpiaz, Fabiano;Giorgini, Paolo
2014-01-01

Abstract

Socio-technical systems are an interplay of social (humans and organizations) and technical components interacting with one an- other to achieve their objectives. Security is a central issue in such com- plex systems, and it cannot be tackled only through technical mecha- nisms: the encryption of sensitive data while being transmitted, does not assure that the receiver will not disclose them to unauthorized parties. Therefore, dealing with security in socio-technical systems requires an analysis: (i) from a social and organizational perspective, to elicit the objectives and security requirements of each component; (ii) from a pro- cedural perspective, to define how the actors behave and interact with each other. But, socio-technical systems need to adapt to changes of the external environment, making the need to deal with security a prob- lem that has to be faced during all the systems’ life-cycle. We propose an iterative and incremental process to elicit security requirements and verify the socio-technical system’s compliance with such requirements throughout the systems’ life cycle.
2014
2
P. H., Meland; Paja, Elda; E. A., Gjære; S., P.; Dalpiaz, Fabiano; Giorgini, Paolo
File in questo prodotto:
File Dimensione Formato  
ijsse-2014.pdf

Solo gestori archivio

Tipologia: Versione editoriale (Publisher’s layout)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 1.46 MB
Formato Adobe PDF
1.46 MB Adobe PDF   Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/101720
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
  • OpenAlex ND
social impact