An NFR Pattern Approach to Dealing with NFRs

Similar documents
Designing for Privacy and Other Competing Requirements Eric Yu 1 and Luiz Marcio Cysneiros 2 1 Faculty of Information Studies

Secure communications via IdentaDefense

Pass-the-Hash. Solution Brief

IIABSC Spring Conference

Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue

NSF Workshop on Big Data Security and Privacy

Goal-Oriented Requirements Engineering: An Overview of the Current Research. by Alexei Lapouchnian

Understanding the Role of Enterprise Architecture. towards Better Institutionalization

Introduction to Online Payment Processing and PayPal Payment Solutions

SecurityMetrics Vision whitepaper

Guide to Vulnerability Management for Small Companies

2015 CENTRI Data Breach Report:

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX

IT Compliance Volume II

Metrics to Assess and Manage Software Application Security Risk. M. Sahinoglu, S. Stockton, S. Morton, P. Vasudev, M. Eryilmaz

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

Secure Semantic Web Service Using SAML

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

INCIDENT RESPONSE CHECKLIST

Regulations on Information Systems Security. I. General Provisions

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Information Technology Branch Access Control Technical Standard

Securing corporate assets with two factor authentication

COSC 472 Network Security

Vulnerability Management Policy

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

Information & Communication Security (SS 15)

An Insight into Cookie Security

WHITE PAPER. Preventing Wireless Data Breaches in Retail

Privacy by Design in Federated Identity Management

A Vulnerability-Centric Requirements Engineering Framework: Analyzing Security Attacks, Countermeasures, and Requirements Based on Vulnerabilities

Pursuing Compliance with the FFIEC Guidance Risk Assessment 101 KPMG RISK ADVISORY SERVICES

Goal-Oriented Requirements Engineering and Software Architecting. Department of Computer Science The University of Texas at Dallas

Information Systems Security

Reducing Cyber Risk in Your Organization

Where every interaction matters.

ICAWEB423A Ensure dynamic website security

CHAPTER 1 INTRODUCTION

Application Security in the Software Development Lifecycle

Five PCI Security Deficiencies of Retail Merchants and Restaurants

Five PCI Security Deficiencies of Restaurants

Multi-Factor Authentication of Online Transactions

Network Security. Network Security Hierarchy. CISCO Security Curriculum

Neustar Intelligent Cloud Services

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

On the Role of Primary and Secondary Assets in Adaptive Security: An Application in Smart Grids

Security Requirements Engineering A Strategic Approach

Lecture 3 Topics on Requirements Engineering

Catapult PCI Compliance

However, the marketplace for replaceable components is still not at sight due to many

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

Frequently Asked Questions (FAQ)

Chapter 7 Information System Security and Control

Reducing Threats

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM

Security. TestOut Modules

Beyond passwords: Protect the mobile enterprise with smarter security solutions

The Business Case for Security Information Management

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Meeting PCI Data Security Standards with

Security Challenges. in Moving to Externalized Datacenters. (Focusing on SaaS) Eran Birk, Spring Business. Intelligence

SECURITY RISK MANAGEMENT

Network Security: Introduction

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Securing mobile devices in the business environment

Security Threat Risk Assessment: the final key piece of the PIA puzzle

NETWORK SECURITY DEVELOPMENT PROCESS. - A Framework for Teaching Network Security Courses *

How Reflection Software Facilitates PCI DSS Compliance

Central Desktop Enterprise Edition (Security Pack)

Multi-factor authentication

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

A Structured Comparison of Security Standards

How to get from laws to technical requirements

Trends in Mobile Authentication. cnlab security ag, obere bahnhofstr. 32b, CH-8640 rapperswil-jona

Managed Security Services

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

UF IT Risk Assessment Standard

Analyzing Security Requirements As Relationships among Strategic Actors

Risk Management Policy

Securing Virtual Desktop Infrastructures with Strong Authentication

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

The Security Rule of The Health Insurance Portability and Accountability Act (HIPAA) Security Training

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication

Meeting PCI Data Security Standards with Juniper Networks Security Threat Response Manager (STRM)

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Attestation and Authentication Protocols Using the TPM

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Domain 5 Information Security Governance and Risk Management

Management of Hardware Passwords in Think PCs.

DEVELOPING A NETWORK SECURITY PLAN

Security Risk Management and Assessment System

Electronic Data Security: Designing Good Data Protection Plans

Security of Payment Card Data on Cloud-Based Mobile Payment Platforms

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Transcription:

An NFR Pattern Approach to Dealing with NFRs Presenter : Sam Supakkul Sam Supakkul Tom Hill Lawrence Chung The Univ. of Texas at Dallas Thein Than Tun The Open University, UK Julio CSP Leite PUC-Rio, Brazil

An NFR Pattern Approach to Dealing with NFRs Presenter : Sam Supakkul (criticality=high) (criticality=low) Beautiful building help? Cost Durability help/hurt? Layered shells Surrounded by water Triangular shape Sam Supakkul Tom Hill Lawrence Chung The Univ. of Texas at Dallas Thein Than Tun The Open University, UK Julio CSP Leite PUC-Rio, Brazil

Some NFRs, such as security, are achieved by dealing with bad things (criticality=high) Credit card info security threaten Break-in wireless network Masquerade user login Steal credit card info mitigate 2-factor authen. Password encryption Biometric authen. Thrustworthiness help/hurt? (criticality=intermediate) help/hurt? (criticality=low) Cost

Acquiring and using NFR knowledge are difficult but insufficient knowledge can be damaging (2 nd ) Biggest credit card theft 45.7M credit cards stolen $20M in fraudulent transactions To cost TJX $1B over 5 years TJX Inc. used security measures ID/password authentication Data encryption TJX not able to prevent the hacker 1. Break-in wireless network 2. Masquerade user login 3. Steal credit card info But TJX did not know enough Potential security problems Applicable mitigations Proper tradeoff among NFRs

This talk presents a pattern-based approach to capturing, organizing, and reusing NFR knowledge Organizing Capturing Reusing Amenable to tool support

Different kinds of patterns for capturing different kinds of NFR knowledge Objective pattern Problem pattern Alternatives pattern Selection pattern

Objective pattern captures a definition of an NFR as softgoals to be achieved Security = Confidentiality, Integrity, and Availability Confidentiality = Privacy and Proprietary Integrity = Authenticity and Non-repudiation Availability = Timeliness and Reliability

Problem pattern captures soft-problems or obstacles to achieving an NFR NFR: Confidentiality [Credit Card] Undesirable situation: Unauthorized access [Server] Threat operations: Masquerading user login, Vulnerability: Transmission of ID/password in clear text

Alternatives pattern captures alternative means or solutions with side-effects effects Problem: Transmission of ID/password in clear text Alternatives: Encrypt ID/password, Biometric authentication Side-effects: Cost, Trustworthiness

Selection pattern captures an application independent selection scheme Weight-based quantitative selection Weight(!) =0.5! Weight(+) =0.5 + Trustworthiness [Security] ++ Retina authentication Fingerprint authentication Weight(++) =1.0 Selection based on the weight of criticality of goal/problem contribution towards goal/problem pro: intuitive, widely used con: subjective weighting, scaling problem! Trustworthiness [Security] Rank(++!)=7 Rank(++!)=6 + ++ Retina authentication Fingerprint authentication Selection based on the ranking of criticality-contribution combination pro: less subjective, no scaling problem con: agreement on ranking Rank-based qualitative selection

A deeper look at the selections Weight-based quantitative selection Weight(!) =0.5! Weight(+) =0.5 + Trustworthiness [Security] ++ Retina authentication Fingerprint authentication Weight(++) =1.0 selection = alternative with highest score selection = max( score(alternative) ) score(alternative) = score(contribution) score(contr) = weight(criticality) x weight (contr)! Trustworthiness [Security] Rank(++!)=7 Rank(++!)=6 + ++ Retina authentication Fingerprint authentication selection = alternative with best ranking selection = min( rank(alternative) ) rank(alternative) = rank(contribution) rank(contr) = rank(criticality-contr) Rank-based qualitative selection user-defined ranking: ++!!G +!!G ++S +S - -S 1 2 6 7 15

Additional info for each pattern: credentials, applicability, refinement rules Credentials and applicability info. help with pattern selection Refinement rules help with pattern reuse/application Credentials Authors Sources Endorsements Known Uses Applicability Who What Why When Where How How much succeed NFRDecomposition refinement rule

Refinement rules used to transform the target model during pattern application 1 2 transform transform before after R3 3 transform 4 transform

Next, patterns may be organized along generalization, aggregation, and classification dim. generalization aggregation instantiation classification Objective pattern Alternatives pattern Problem pattern decomposition specialization Organizing Selection pattern Capturing 1 234 5 6 7 Reusing Amenable to tool support

Specialized pattern is more specific in breadth or in depth Generalization dimension R2' More specific in breadth US Law: Security = Conf., Integrity, Avail. Payment Card Industry (PCI): Security = Confidentiality More specific in depth PCI also concerned with Accountability beyond Privacy R5

Composite pattern assembles smaller patterns to capture a larger chunk of knowledge Aggregation dimension Applying the whole pattern will apply the part-of patterns

A pattern is used as a template to instantiate occurrence patterns Classification dimension Meta-pattern Occurrence pattern Binding Reference model Applying the occurrence pattern applies the meta-pattern with customization (binding) Security asset mapped to Credit Card Info (super-class to sub-class) Security mapped to Confidentiality (parent goal to sub-goal)

Applying the approach to the TJX case shows preliminary positive results reuse knowledge in a different project Break-in wireless network Masquerade user login Steal credit card info Method Construct tool prototypes Build for reuse scenario Build with reuse scenario Hypotheses Knowledge from the case can be captured and reused in a different project The approach works in a tool- assisted environment

The NFR Pattern Assistant for pattern support The RE-Tools for knowledge modeling capturing organizing The NFR Pattern Assistant The RE-Tools StarUML extension framework reusing The NFR Framework The i* Framework KAOS Problem Frame UML www.utdallas.edu/~supakkul/tools/nfrpassist www.utdallas.edu/~supakkul/tools/re-tools

Build for reuse scenario: model and patternize Model for the current project Patternize and organize for future projects

Build with reuse scenario: select and apply

Results: 93% of knowledge captured and reused The approach works but needs improvements Break-in wireless network Masquerade user login Steal credit card info for Sample results modeled knowledge 1 composite, 5 primitive generated by application Limitations (future work) Tool/usability related Models not captured with original placements Knowledge not captured due to missing refinement rules (25 rules defined) Pattern search and selection are currently manual Approach related Need to support dealing with NFRs during architecture/design Need more case studies

In summary, the difficulty of acquiring and using NFR knowledge can be alleviated by NFR patterns generalization aggregation instantiation classification Objective pattern Alternatives pattern Problem pattern decomposition specialization Organizing Selection pattern Capturing 1 234 5 6 7 Reusing Amenable to tool support Thank you Questions & Comments?

Backup slides

Five operations are defined for manipulating NFR patterns

NFR pattern concepts are defined in a meta-model model and implemented by the tool

Modeling concepts are integrated in a meta-model model and implemented by the tool Type Topic 1 Topic EndPoint Satisficed Goal 1 0..1 0..* 1 1 Phenomenon 1 Proposition 1 parent 1..* offspring Problem 1 Satisficing Label Weakly Satisficed Undecided Weakly Denied Denied Softgoal Hardgoal Want Soft Problem Hard Problem Impact Conflict NFR Softgoal Claim Operationalizing Softgoal Requirement 1..* Stakeholder Adversary Want Want 0..* 0..* Refer Reference Constrain Reference Stakeholder Agent 1 Adversary 1..* Given Domain RefInterface EndPoint Requirement Reference 1 1 1..* Referenced Phenomenon Undesirable Situation Designed Domain 1..* realize Controlled Phenomenon Undesirable Mechanism Machine Domain 1..* Interface 1 1..* Shared Phenomenon controller Domain 1..* generalize 0..* 1 Contribution Decomposition Eql And Or Correlation Satisficing Legend adopted metaelement extended metaelement Direct Satisficing Make proxy of existing metaelement Softgoal Stakeholder Satisficing Some Plus Help Hurt Some Minus Break 1

Refinement rules for objective pattern

Example of refinement rules in an objective pattern

Refinement rules for problem pattern

Example of refinement rules in a problem pattern

Refinement rules for alternatives pattern

Example of refinement rules in an alternatives pattern

Refinement rules for selection pattern

Example of refinement rules in a selection pattern

Constraints for pattern aggregation

Constraints for pattern instantiation