SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
Software Engineering and
     Information Security
     R&D Perspectives

     Massimo Felici




Massimo Felici © 2012   Software Engineering and Information Security   1
Overview
     • Background and Experience
     • Software Engineering and Information Security: Rationale
     • Complex Application Domain: Air Traffic Management
     • Research Perspectives
           – Requirements
           – Risk Analysis
           – Design and Validation
     • Research Considerations
           – Research Impact
     • Future Research


Massimo Felici © 2012        Software Engineering and Information Security   2
Background and Experience




Massimo Felici © 2012   Software Engineering and Information Security   3
Rationale
   SOFTWARE ENGINEERING AND
   INFORMATION SECURITY

Massimo Felici © 2012   Software Engineering and Information Security   4
Sony Security Cyber Attack
     • “Sony of Japan revealed that names, addresses, passwords
       and possibly credit-card details of 77 million accounts were
       stolen when hackers gained access to the network it runs in 60
       countries for its PlayStation online-gaming system”
                                                                 [The Economist, Apr 28th 2011]

     • “Sony warns of almost 25 million extra user detail theft”
                                                                         [BBC News, 3 May 2011]




Massimo Felici © 2012    Software Engineering and Information Security                            5
Security Attacks
Attacker Types and Techniques                    Attach Type, Time and Impact




                           [IBM Security Solutions, IBM X-Force® 2011 Mid-year Trend and Risk Report]

Massimo Felici © 2012   Software Engineering and Information Security                              6
Vulnerability Disclosures




                        [IBM Security Solutions, IBM X-Force® 2011 Mid-year Trend and Risk Report]


Massimo Felici © 2012               Software Engineering and Information Security                    7
Who should worry?
     • Security is a concern across different domains and countries
     • “An investigation of targeted intrusions into more than 70 global
       companies, governments, and non-profit organizations during the last
       five years”




                                                                          [McAfee, 2011]



Massimo Felici © 2012     Software Engineering and Information Security                    8
Scenario

   AIR TRAFFIC MANAGEMENT


Massimo Felici © 2012   Software Engineering and Information Security   9
Complex Application Domain
     • Ongoing developments in the Air Traffic Management domain
     • The SESAR (Single European Sky ATM Research) project is the
       European air traffic control infrastructure modernisation programme.
       SESAR aims at developing the new generation Air Traffic
       Management system capable of ensuring the safety and fluidity of air
       transport worldwide over the next 30 years
     • Overall features
           – Large-Scale... European (and beyond) wide systems
           – Complex ICT
           – Stringent security requirements                     along      side   other   key
             Performance Indicators (e.g. Safety)
           – Deployments of new ICT involving operational changes
           – Human factors, changes in ICT affecting work practices


Massimo Felici © 2012       Software Engineering and Information Security                        10
Air Traffic Management
Today                                                The SESAR ATM System




                                              [SESAR Release, SESAR Joint Undertaking 2011]

Massimo Felici © 2012   Software Engineering and Information Security                    11
System Wide Information Management
      SWIM Infrastructure                           System Security Design




Massimo Felici © 2012   Software Engineering and Information Security        12
Research
   SOFTWARE ENGINEERING AND
   INFORMATION SECURITY

Massimo Felici © 2012   Software Engineering and Information Security   13
Ensuring Trustworthiness and Security in Service Composition


       Socio-Technical Security Requirements
                          Problem: ensuring trustworthiness and
                          security in service composition

                                                                        Modelling and Validation:
                                                                        socio-technical security requirements


Context: operational accounts of ATM
practice highlight information exchange




  Massimo Felici © 2012             Software Engineering and Information Security                               14
Requirements Evolution
 Problem: understanding requirements
 changes, requirements evolution
                                                            • Avionics case study
                                                            • Safety-critical software
                                                            • Empirical analysis of
                                                              requirements changes
                                                            • Functional analysis of
                                                              requirements changes
                                                            • Architecture stability
                                                            • Quantitative accounts of
                                                              requirements changes
                                                            • Requirements evolution
                                                              modelling
                                                                                    [Felici, 2004]

Massimo Felici © 2012        Software Engineering and Information Security                     15
Security Engineering for Lifelong Evolvable Systems




     Security Model-Driven Risk Analysis
   Problem: assessing impact of changes                                               [Felici et al., 2011]
   on critical security properties




   Modelling: structured (CORAS) models
   elicited to perform risk analysis




                                                              Validation: shift of risk perceptions

Massimo Felici © 2012             Software Engineering and Information Security                               16
Interdisciplinary Research Collaboration in                             Interdisciplinary Design and
            Dependability of Computer-Based Systems                                 Evaluation of Dependability



     Emerging Technological Risk
                                                             • Provides a multidisciplinary
                                                               account of technology risk
                                                             • Reviews different case
                                                               studies
                                                             • Identifies classes of socio-
                                                               technical hazards
                                                                   – how technological risk crosses
                                                                     organizational boundaries
                                                                   – how technological trajectories
     S. Anderson, M. Felici
                                                                     and evolution develop
     Emerging Technological Risk
     Underpinning the Risk of Technology Innovation
                                                                   – how social behaviour shapes,
                                                                     and is shaped by, technology
     Springer, 2012




Massimo Felici © 2012               Software Engineering and Information Security                          17
System Engineering for Security & Dependability




     Security & Dependability Patterns
Problem: Security & Dependability                              Context: supporting organisational work
Patterns to design and implement ICT                           practice to deal with emerging threats




  Validation: Security & Dependability
  Patterns enabling resilient processes



Massimo Felici © 2012           Software Engineering and Information Security                            18
Trust Observations
        Problem: validating new operational
        concepts and system configurations

     • Empirical analysis of an operational account of trust in
       validation exercises
     • Trust observations highlight how                                    different      system
       configurations support work practices




                                                                                  [Felici et al., 2011]
Massimo Felici © 2012          Software Engineering and Information Security                              19
Summary
     • Information security is a real problem in different complex
       application domains
           – Air Traffic Management
     • Research Perspectives
           – Requirements problems: validation and evolution
           – Socio-technical Risk Analysis: modelling and social
             perspectives of risk analysis
           – Validation: Dependability, Resilience, Trust




Massimo Felici © 2012      Software Engineering and Information Security   20
Research Considerations
   SOFTWARE ENGINEERING AND
   INFORMATION SECURITY

Massimo Felici © 2012   Software Engineering and Information Security   21
Research Remarks
     • Engineering software systems for security and trustworthiness
       requires dealing with subtle complexities
     • It is necessary to combine diverse methodologies
       throughout software development and deployment
     • My research is concerned with supporting engineering
       software and understanding software complexities (e.g. in
       terms of critical features) in different development phases
       (e.g. validation) and application domains
           – Multidisciplinary research
           – Socio-technical systems
           – Dependability, Risk, Trust



Massimo Felici © 2012      Software Engineering and Information Security   22
Research Impact: ATM Community
     • Exploited PhD on          requirements             evolution       within   the   EU
       SecureChange project
     • Exploited Dependability, Risk and Trust studies to support SME in
       related EU ICT projects
     • Conducted case studies drawn from the ATM domain
     • Led Edinburgh University engagement in the INNOVATE (INNOvation
       through Validation for Air Transportation in Europe) consortium,
       Modelling Support to Validation, Associate Partners of SESAR JU




     • Visibility: Work on Trust published, and also linked in SKYbrary (the
       online ATM reference collection for aviation safety knowledge)
     • Visibility: Consulting Editor for the US FAA (Federal Aviation
       Administration) International Journal of Applied Aviation
Massimo Felici © 2012     Software Engineering and Information Security                       23
Supporting European Commission
     • Co-organised a networking session, on Privacy, Identity Management
       and Dependability in Emerging ICT-based Interaction Scenarios:
       Trustworthy Fulfillment of Requirements beyond purely Technological
       Innovation, at ICT 2008
     • Appointed by the European Commission, Information Society and
       Media Directorate, Trust and Security, as Independent
       Expert/Reviewer for industry-led ICT projects
           – PrimeLife, Privacy and Identity Management in Europe for Life




           – WebSand, Server-driven Outbound Web-application Sandboxing




Massimo Felici © 2012       Software Engineering and Information Security    24
Another Application Domain: Healthcare
     Recently, started collaborating and extending research work in
     Healthcare domains
     • Centre for Population Health Sciences, The University of Edinburgh
        Anderson, S., Fairbrother, P., Felici, M., Hanley, J., McKinstry, B. Ure,
        J.: From Hazards to Resilience in Socio-Technical Healthcare
        Systems. In Hollnagel, E., Rigaud, E., Besnard, D. (Eds.),
        Proceedings of the fourth Resilience Engineering Symposium, pp.15-
        21 (2011)
     • Warwick Medical School, The University of Warwick
        Sujan, M.-A., Felici, M.: Combining Failure Mode and Functional
        Resonance Analyses in Healthcare Settings. In Proceedings of
        SAFECOMP 2012, the 31st International Conference on Computer
        Safety, Reliability and Security, LNCS, Springer-Verlag (to appear)




Massimo Felici © 2012       Software Engineering and Information Security           25
Supporting Research Communities
• SAFECOMP, International Conference on Computer Safety, Reliability and Security




• DSN, IEEE/IFIP International Conference on Dependable Systems and Networks




• SERE, IEEE International Conference on Software Security and Reliability
• ISARCS, International ACM SigSoft Symposium on Architecting Critical Systems
...and many others

Massimo Felici © 2012      Software Engineering and Information Security            26
Future Research
     • Software Engineering Foundations
           – Empirical investigation of software engineering models (e.g.
             requirements and design models)
           – Further understanding evolution (e.g. requirements evolution)
           – Modelling support to validation – INNOVATE (INNOvation
             through Validation for Air Transportation in Europe)
     • Security and Trust Observations
           – Security and Trust as deployment strategies that offers a rich
             range of trade-offs
           – Empirical investigation and validation of different Security and
             Trust models
     • Dependability Benchmarking and Risk Analysis
           – Socio-technical risk analysis
           – Operational validation

Massimo Felici © 2012        Software Engineering and Information Security      27
THANK YOU


Massimo Felici © 2012   Software Engineering and Information Security   28

Más contenido relacionado

La actualidad más candente

Software Engineering Unit 1
Software Engineering Unit 1Software Engineering Unit 1
Software Engineering Unit 1Abhimanyu Mishra
 
Inversion of Control
Inversion of ControlInversion of Control
Inversion of ControlGlen Alleman
 
Chapter 4 software project planning
Chapter 4 software project planningChapter 4 software project planning
Chapter 4 software project planningPiyush Gogia
 
Unit 6- Development Evolution model
Unit 6- Development Evolution model Unit 6- Development Evolution model
Unit 6- Development Evolution model arvind pandey
 
1 sad-01-introduction-june2015-rev
1 sad-01-introduction-june2015-rev1 sad-01-introduction-june2015-rev
1 sad-01-introduction-june2015-revFajar Baskoro
 
Unit 2-software development process notes
Unit 2-software development process notes Unit 2-software development process notes
Unit 2-software development process notes arvind pandey
 
SE18_Lec 04_Requirements Analysis and Specification
SE18_Lec 04_Requirements Analysis and SpecificationSE18_Lec 04_Requirements Analysis and Specification
SE18_Lec 04_Requirements Analysis and SpecificationAmr E. Mohamed
 
Quality Attribute: Testability
Quality Attribute: TestabilityQuality Attribute: Testability
Quality Attribute: TestabilityPranay Singh
 
Requirement Engineering Lec.1 & 2 & 3
Requirement Engineering Lec.1 & 2 & 3Requirement Engineering Lec.1 & 2 & 3
Requirement Engineering Lec.1 & 2 & 3Ahmed Alageed
 
Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7Dhairya Joshi
 
CS8494 SOFTWARE ENGINEERING Unit-5
CS8494 SOFTWARE ENGINEERING Unit-5CS8494 SOFTWARE ENGINEERING Unit-5
CS8494 SOFTWARE ENGINEERING Unit-5SIMONTHOMAS S
 
Ian Sommerville, Software Engineering, 9th Edition Ch 4
Ian Sommerville,  Software Engineering, 9th Edition Ch 4Ian Sommerville,  Software Engineering, 9th Edition Ch 4
Ian Sommerville, Software Engineering, 9th Edition Ch 4Mohammed Romi
 
eUnit 2 software process model
eUnit 2  software process modeleUnit 2  software process model
eUnit 2 software process modelPreeti Mishra
 
Introduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyIntroduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyGaditek
 

La actualidad más candente (20)

Ch1
Ch1Ch1
Ch1
 
Software Engineering Unit 1
Software Engineering Unit 1Software Engineering Unit 1
Software Engineering Unit 1
 
Unit1
Unit1Unit1
Unit1
 
Inversion of Control
Inversion of ControlInversion of Control
Inversion of Control
 
Chapter 4 software project planning
Chapter 4 software project planningChapter 4 software project planning
Chapter 4 software project planning
 
Unit 6- Development Evolution model
Unit 6- Development Evolution model Unit 6- Development Evolution model
Unit 6- Development Evolution model
 
1 sad-01-introduction-june2015-rev
1 sad-01-introduction-june2015-rev1 sad-01-introduction-june2015-rev
1 sad-01-introduction-june2015-rev
 
Unit 2-software development process notes
Unit 2-software development process notes Unit 2-software development process notes
Unit 2-software development process notes
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
SE18_Lec 04_Requirements Analysis and Specification
SE18_Lec 04_Requirements Analysis and SpecificationSE18_Lec 04_Requirements Analysis and Specification
SE18_Lec 04_Requirements Analysis and Specification
 
Quality Attribute: Testability
Quality Attribute: TestabilityQuality Attribute: Testability
Quality Attribute: Testability
 
Component level design
Component   level designComponent   level design
Component level design
 
Requirement Engineering Lec.1 & 2 & 3
Requirement Engineering Lec.1 & 2 & 3Requirement Engineering Lec.1 & 2 & 3
Requirement Engineering Lec.1 & 2 & 3
 
Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7
 
CS8494 SOFTWARE ENGINEERING Unit-5
CS8494 SOFTWARE ENGINEERING Unit-5CS8494 SOFTWARE ENGINEERING Unit-5
CS8494 SOFTWARE ENGINEERING Unit-5
 
2 feasibility-study
2 feasibility-study2 feasibility-study
2 feasibility-study
 
Reqdet
ReqdetReqdet
Reqdet
 
Ian Sommerville, Software Engineering, 9th Edition Ch 4
Ian Sommerville,  Software Engineering, 9th Edition Ch 4Ian Sommerville,  Software Engineering, 9th Edition Ch 4
Ian Sommerville, Software Engineering, 9th Edition Ch 4
 
eUnit 2 software process model
eUnit 2  software process modeleUnit 2  software process model
eUnit 2 software process model
 
Introduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyIntroduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information Technology
 

Destacado

analysis and design of information system
analysis and design of information systemanalysis and design of information system
analysis and design of information systemRenu Sharma
 
System Design and Analysis 1
System Design and Analysis 1System Design and Analysis 1
System Design and Analysis 1Boeun Tim
 
System Analysis And Design Management Information System
System Analysis And Design Management Information SystemSystem Analysis And Design Management Information System
System Analysis And Design Management Information Systemnayanav
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and DesignAamir Abbas
 

Destacado (6)

ATM Concept 4D ASAS and TFM
ATM Concept 4D ASAS and TFMATM Concept 4D ASAS and TFM
ATM Concept 4D ASAS and TFM
 
Slides chapters 6-7
Slides chapters 6-7Slides chapters 6-7
Slides chapters 6-7
 
analysis and design of information system
analysis and design of information systemanalysis and design of information system
analysis and design of information system
 
System Design and Analysis 1
System Design and Analysis 1System Design and Analysis 1
System Design and Analysis 1
 
System Analysis And Design Management Information System
System Analysis And Design Management Information SystemSystem Analysis And Design Management Information System
System Analysis And Design Management Information System
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 

Similar a Software Engineering and Information Security

PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonIBM Danmark
 
Linder,William H IT Auditor 0216
Linder,William H IT  Auditor 0216Linder,William H IT  Auditor 0216
Linder,William H IT Auditor 0216William Linder
 
Linder,William H IT Auditor 0216
Linder,William H IT  Auditor 0216Linder,William H IT  Auditor 0216
Linder,William H IT Auditor 0216William Linder
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security Malachi Jones
 
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...Luca Moroni ✔✔
 
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...CSCJournals
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering frameworkiaemedu
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering frameworkIAEME Publication
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering frameworkiaemedu
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering frameworkiaemedu
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Rightpvanwoud
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...CODE BLUE
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteAntonio Fontes
 
IBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscapeIBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscapeIBM Sverige
 

Similar a Software Engineering and Information Security (20)

PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
Linder,William H IT Auditor 0216
Linder,William H IT  Auditor 0216Linder,William H IT  Auditor 0216
Linder,William H IT Auditor 0216
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Linder,William H IT Auditor 0216
Linder,William H IT  Auditor 0216Linder,William H IT  Auditor 0216
Linder,William H IT Auditor 0216
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security
 
Appsec Introduction
Appsec IntroductionAppsec Introduction
Appsec Introduction
 
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
 
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynote
 
IBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscapeIBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscape
 

Último

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 

Último (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 

Software Engineering and Information Security

  • 1. Software Engineering and Information Security R&D Perspectives Massimo Felici Massimo Felici © 2012 Software Engineering and Information Security 1
  • 2. Overview • Background and Experience • Software Engineering and Information Security: Rationale • Complex Application Domain: Air Traffic Management • Research Perspectives – Requirements – Risk Analysis – Design and Validation • Research Considerations – Research Impact • Future Research Massimo Felici © 2012 Software Engineering and Information Security 2
  • 3. Background and Experience Massimo Felici © 2012 Software Engineering and Information Security 3
  • 4. Rationale SOFTWARE ENGINEERING AND INFORMATION SECURITY Massimo Felici © 2012 Software Engineering and Information Security 4
  • 5. Sony Security Cyber Attack • “Sony of Japan revealed that names, addresses, passwords and possibly credit-card details of 77 million accounts were stolen when hackers gained access to the network it runs in 60 countries for its PlayStation online-gaming system” [The Economist, Apr 28th 2011] • “Sony warns of almost 25 million extra user detail theft” [BBC News, 3 May 2011] Massimo Felici © 2012 Software Engineering and Information Security 5
  • 6. Security Attacks Attacker Types and Techniques Attach Type, Time and Impact [IBM Security Solutions, IBM X-Force® 2011 Mid-year Trend and Risk Report] Massimo Felici © 2012 Software Engineering and Information Security 6
  • 7. Vulnerability Disclosures [IBM Security Solutions, IBM X-Force® 2011 Mid-year Trend and Risk Report] Massimo Felici © 2012 Software Engineering and Information Security 7
  • 8. Who should worry? • Security is a concern across different domains and countries • “An investigation of targeted intrusions into more than 70 global companies, governments, and non-profit organizations during the last five years” [McAfee, 2011] Massimo Felici © 2012 Software Engineering and Information Security 8
  • 9. Scenario AIR TRAFFIC MANAGEMENT Massimo Felici © 2012 Software Engineering and Information Security 9
  • 10. Complex Application Domain • Ongoing developments in the Air Traffic Management domain • The SESAR (Single European Sky ATM Research) project is the European air traffic control infrastructure modernisation programme. SESAR aims at developing the new generation Air Traffic Management system capable of ensuring the safety and fluidity of air transport worldwide over the next 30 years • Overall features – Large-Scale... European (and beyond) wide systems – Complex ICT – Stringent security requirements along side other key Performance Indicators (e.g. Safety) – Deployments of new ICT involving operational changes – Human factors, changes in ICT affecting work practices Massimo Felici © 2012 Software Engineering and Information Security 10
  • 11. Air Traffic Management Today The SESAR ATM System [SESAR Release, SESAR Joint Undertaking 2011] Massimo Felici © 2012 Software Engineering and Information Security 11
  • 12. System Wide Information Management SWIM Infrastructure System Security Design Massimo Felici © 2012 Software Engineering and Information Security 12
  • 13. Research SOFTWARE ENGINEERING AND INFORMATION SECURITY Massimo Felici © 2012 Software Engineering and Information Security 13
  • 14. Ensuring Trustworthiness and Security in Service Composition Socio-Technical Security Requirements Problem: ensuring trustworthiness and security in service composition Modelling and Validation: socio-technical security requirements Context: operational accounts of ATM practice highlight information exchange Massimo Felici © 2012 Software Engineering and Information Security 14
  • 15. Requirements Evolution Problem: understanding requirements changes, requirements evolution • Avionics case study • Safety-critical software • Empirical analysis of requirements changes • Functional analysis of requirements changes • Architecture stability • Quantitative accounts of requirements changes • Requirements evolution modelling [Felici, 2004] Massimo Felici © 2012 Software Engineering and Information Security 15
  • 16. Security Engineering for Lifelong Evolvable Systems Security Model-Driven Risk Analysis Problem: assessing impact of changes [Felici et al., 2011] on critical security properties Modelling: structured (CORAS) models elicited to perform risk analysis Validation: shift of risk perceptions Massimo Felici © 2012 Software Engineering and Information Security 16
  • 17. Interdisciplinary Research Collaboration in Interdisciplinary Design and Dependability of Computer-Based Systems Evaluation of Dependability Emerging Technological Risk • Provides a multidisciplinary account of technology risk • Reviews different case studies • Identifies classes of socio- technical hazards – how technological risk crosses organizational boundaries – how technological trajectories S. Anderson, M. Felici and evolution develop Emerging Technological Risk Underpinning the Risk of Technology Innovation – how social behaviour shapes, and is shaped by, technology Springer, 2012 Massimo Felici © 2012 Software Engineering and Information Security 17
  • 18. System Engineering for Security & Dependability Security & Dependability Patterns Problem: Security & Dependability Context: supporting organisational work Patterns to design and implement ICT practice to deal with emerging threats Validation: Security & Dependability Patterns enabling resilient processes Massimo Felici © 2012 Software Engineering and Information Security 18
  • 19. Trust Observations Problem: validating new operational concepts and system configurations • Empirical analysis of an operational account of trust in validation exercises • Trust observations highlight how different system configurations support work practices [Felici et al., 2011] Massimo Felici © 2012 Software Engineering and Information Security 19
  • 20. Summary • Information security is a real problem in different complex application domains – Air Traffic Management • Research Perspectives – Requirements problems: validation and evolution – Socio-technical Risk Analysis: modelling and social perspectives of risk analysis – Validation: Dependability, Resilience, Trust Massimo Felici © 2012 Software Engineering and Information Security 20
  • 21. Research Considerations SOFTWARE ENGINEERING AND INFORMATION SECURITY Massimo Felici © 2012 Software Engineering and Information Security 21
  • 22. Research Remarks • Engineering software systems for security and trustworthiness requires dealing with subtle complexities • It is necessary to combine diverse methodologies throughout software development and deployment • My research is concerned with supporting engineering software and understanding software complexities (e.g. in terms of critical features) in different development phases (e.g. validation) and application domains – Multidisciplinary research – Socio-technical systems – Dependability, Risk, Trust Massimo Felici © 2012 Software Engineering and Information Security 22
  • 23. Research Impact: ATM Community • Exploited PhD on requirements evolution within the EU SecureChange project • Exploited Dependability, Risk and Trust studies to support SME in related EU ICT projects • Conducted case studies drawn from the ATM domain • Led Edinburgh University engagement in the INNOVATE (INNOvation through Validation for Air Transportation in Europe) consortium, Modelling Support to Validation, Associate Partners of SESAR JU • Visibility: Work on Trust published, and also linked in SKYbrary (the online ATM reference collection for aviation safety knowledge) • Visibility: Consulting Editor for the US FAA (Federal Aviation Administration) International Journal of Applied Aviation Massimo Felici © 2012 Software Engineering and Information Security 23
  • 24. Supporting European Commission • Co-organised a networking session, on Privacy, Identity Management and Dependability in Emerging ICT-based Interaction Scenarios: Trustworthy Fulfillment of Requirements beyond purely Technological Innovation, at ICT 2008 • Appointed by the European Commission, Information Society and Media Directorate, Trust and Security, as Independent Expert/Reviewer for industry-led ICT projects – PrimeLife, Privacy and Identity Management in Europe for Life – WebSand, Server-driven Outbound Web-application Sandboxing Massimo Felici © 2012 Software Engineering and Information Security 24
  • 25. Another Application Domain: Healthcare Recently, started collaborating and extending research work in Healthcare domains • Centre for Population Health Sciences, The University of Edinburgh Anderson, S., Fairbrother, P., Felici, M., Hanley, J., McKinstry, B. Ure, J.: From Hazards to Resilience in Socio-Technical Healthcare Systems. In Hollnagel, E., Rigaud, E., Besnard, D. (Eds.), Proceedings of the fourth Resilience Engineering Symposium, pp.15- 21 (2011) • Warwick Medical School, The University of Warwick Sujan, M.-A., Felici, M.: Combining Failure Mode and Functional Resonance Analyses in Healthcare Settings. In Proceedings of SAFECOMP 2012, the 31st International Conference on Computer Safety, Reliability and Security, LNCS, Springer-Verlag (to appear) Massimo Felici © 2012 Software Engineering and Information Security 25
  • 26. Supporting Research Communities • SAFECOMP, International Conference on Computer Safety, Reliability and Security • DSN, IEEE/IFIP International Conference on Dependable Systems and Networks • SERE, IEEE International Conference on Software Security and Reliability • ISARCS, International ACM SigSoft Symposium on Architecting Critical Systems ...and many others Massimo Felici © 2012 Software Engineering and Information Security 26
  • 27. Future Research • Software Engineering Foundations – Empirical investigation of software engineering models (e.g. requirements and design models) – Further understanding evolution (e.g. requirements evolution) – Modelling support to validation – INNOVATE (INNOvation through Validation for Air Transportation in Europe) • Security and Trust Observations – Security and Trust as deployment strategies that offers a rich range of trade-offs – Empirical investigation and validation of different Security and Trust models • Dependability Benchmarking and Risk Analysis – Socio-technical risk analysis – Operational validation Massimo Felici © 2012 Software Engineering and Information Security 27
  • 28. THANK YOU Massimo Felici © 2012 Software Engineering and Information Security 28