27 research outputs found

    Towards a Security Engineering Process Model for Electronic Business Processes

    Full text link
    Business process management (BPM) and accompanying systems aim at enabling enterprises to become adaptive. In spite of the dependency of enterprises on secure business processes, BPM languages and techniques provide only little support for security. Several complementary approaches have been proposed for security in the domain of BPM. Nevertheless, support for a systematic procedure for the development of secure electronic business processes is still missing. In this paper, we pinpoint the need for a security engineering process model in the domain of BPM and identify key requirements for such process model.Comment: Ninth European Dependable Computing Conference (EDCC 2012

    eNAQ: A prototype for an electronic version of the UN national accounts questionnaire

    Full text link

    Security Risk Assessments: Modeling and Risk Level Propagation

    Get PDF
    Security risk assessment is an important task in systems engineering. It is used to derive security requirements for a secure system design and to evaluate design alternatives as well as vulnerabilities. Security risk assessment is also a complex and interdisciplinary task, where experts from the application domain and the security domain have to collaborate and understand each other. Automated and tool-supported approaches are desired to help manage the complexity. However, the models used for system engineering usually focus on functional behavior and lack security-related aspects. Therefore, we present our modeling approach that alleviates communication between the involved experts and features steps of computer-aided modeling to achieve consistency and avoid omission errors. We demonstrate our approach with an example. We also describe how to model impact rating and attack feasibility estimation in a modular fashion, along with the propagation and aggregation of these estimations through the model. As a result, experts can make local decisions or changes in the model, which in turn provides the impact of these decisions or changes on the overall risk profile. Finally, we discuss the advantages of our model-based method

    Peroxisomal very long-chain fatty acid transport is targeted by herpesviruses and the antiviral host response

    Get PDF
    Very long-chain fatty acids (VLCFA) are critical for human cytomegalovirus replication and accumulate upon infection. Here, we used Epstein-Barr virus (EBV) infection of human B cells to elucidate how herpesviruses target VLCFA metabolism. Gene expression profiling revealed that, despite a general induction of peroxisome-related genes, EBV early infection decreased expression of the peroxisomal VLCFA transporters ABCD1 and ABCD2, thus impairing VLCFA degradation. The mechanism underlying ABCD1 and ABCD2 repression involved RNA interference by the EBV-induced microRNAs miR-9-5p and miR-155, respectively, causing significantly increased VLCFA levels. Treatment with 25-hydroxycholesterol, an antiviral innate immune modulator produced by macrophages, restored ABCD1 expression and reduced VLCFA accumulation in EBV-infected B-lymphocytes, and, upon lytic reactivation, reduced virus production in control but not ABCD1-deficient cells. Finally, also other herpesviruses and coronaviruses target ABCD1 expression. Because viral infection might trigger neuroinflammation in X-linked adrenoleukodystrophy (X-ALD, inherited ABCD1 deficiency), we explored a possible link between EBV infection and cerebral X-ALD. However, neither immunohistochemistry of post-mortem brains nor analysis of EBV seropositivity in 35 X-ALD children supported involvement of EBV in the onset of neuroinflammation. Collectively, our findings indicate a previously unrecognized, pivotal role of ABCD1 in viral infection and host defence, prompting consideration of other viral triggers in cerebral X-ALD

    SecEPM: A security engineering process model for electronic business processes

    No full text
    Business process management (BPM) and accompanying systems allow organizations to react faster both to environmental and market changes. Therefore, BPM is widely applied in industry. Although organizations depend on the secure enactment of electronic business processes, existing BPM languages and techniques provide only little support for security. Several approaches have been proposed to close the gap for security in the domain of BPM. Nevertheless, an approach to develop secure electronic business processes systematically is still missing. In this paper, we provide the design as well as key entities of our Security Engineering Process Model (SecEPM) for electronic business processes. SecEPM guides security, business process, and domain experts through the development of secur e business processes from the identification of security goals to the selection and configuration of security controls. It integrates security in the development life cycle of electronic business processes in a flexible way, thus allowing for a secure, adaptable organization

    Modell-basiertes Security Engineering elektronischer Geschäftsprozesse

    No full text
    In this thesis we develop a security engineering framework in the domain of business process management that bridges the gap between business process models on one side and the design of proper controls and their configuration on the other side. Our proposal aims at capacitating people with low security background, providing flexibility as well as means for customization, and offering integration possibilities into existing development processes and tool chains. Our study indicates the utility of our framework in order to develop secure electronic business processes. Furthermore, we lay out advantages of our framework over existing approaches applying systematically derived evaluation criteria.In dieser Arbeit entwickeln wir ein Rahmenwerk für das Security Engineering im Anwendungsbereich des Geschäftsprozessmanagements, welches eine Brücke von Geschäftsprozessmodellen zu dem Entwurf angemessener Schutzmaßnahmen und deren Konfiguration schlägt. Unser Vorschlag zielt auf die Einbeziehung von Personen mit geringen Sicherheitskenntnissen ab und stellt flexible Mittel für Anpassungen an die Umgebung sowie die Integration in existierende Entwicklungsprozesse und Werkzeugketten bereit. Unsere Untersuchungen zeigen den Nutzen des Rahmenwerks, um sichere, elektronische Geschäftsprozesse zu entwickeln. Anhand von systematisch entwickelten Bewertungskriterien können wir zudem die Vorteile unseres Rahmenwerkes gegenüber bestehenden Ansätzen verdeutlichen

    Testing Production Systems Safely: Common Precautions in Penetration Testing

    No full text
    Unlike testing in a laboratory or test bed situation, the testing of production systems requires precautions to avoid side effects that might damage or disturb the system, its environment, or its users. This paper outlines safety precautions to be taken when testing production systems. Specifically we discuss precautions for penetration testing aiming at identifying security vulnerabilities. We generalize and document experience we gained as penetration testers, describing how the risks of testing can be mitigated through selection of test cases and techniques, partial isolation of subsystems and organizational measures. Though some of the precautions are specific to security testing, our experience might be helpful to anyone testing production systems
    corecore