Published June 5, 2014
| Version v1
Presentation
Open
Defining security requirements for a remote access system
Authors/Creators
- 1. GESIS – Leibniz-Institute for the Social Sciences
Description
This paper presents some first results of the one-year project "Empirical Secure Software Engineering (ESSE)" which had the two aims (1) to define security requirements for a planned Secure Data Center remote access at GESIS in Germany and (2) to evaluate different threat modelling techniques. Such techniques are intended to assist software developers in defining and evaluating security risks for a system and in deducing necessary requirements for design, implementation and operation. Using several different modelling techniques a group of participating GESIS staff from various archiving and IT backgrounds generated a collection of threat models. We then interviewed participants about their viewpoints, aggregated the models and discussed them in a group session. Through this process we defined security requirements and translated them into implementable technical and organizational security recommendations. Our approach also enabled us to evaluate the applied techniques' strengths and weaknesses. We will explain some of the security requirements we defined and also show how our process allowed us to make visible different stakeholders' viewpoints, was able to support meaningful discussion, and facilitated decision making. Our process can be useful for other archives looking for ways to define security requirements in the fields of archiving and data sharing.
Files
2014_poster_kinder-kurlanda_etal.pdf
Files
(1.9 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:9f6293e5c8fc7652585b5c064b815872
|
1.9 MB | Preview Download |