59 research outputs found

    SecureScale: Exploring Synergies between Security and Scalability in Software Development and Operation

    Get PDF
    Security and scalability are core software qualities, which as non-functional aspects share certain characteristics and challenges in how they are approached during software development and operation. Based on expert interviews, this paper explores interactions and dependencies between security and scalability, as well as similarities and differences in their challenges. It concludes that the current understanding of the relationship between security and scalability is not yet mature. Further, it points to future research needs to better understand the relationship between these two quality aspects and better support practitioners in addressing security and scalability in a more integrated fashion.publishedVersio

    GENERATOR DENAH MEJA UJIAN DENGAN IMPLEMENTASI ALGORITMA BACKTRACKING

    Get PDF
    Beberapa penelitian mengidentifikasikan bahwa teknik menyontek yang paling umum digunakan adalah bertukar jawaban dengan peserta didik yang berada pada posisi terdekat atau melihat jawaban tanpa sepengetahuan orang yang bersangkutan. (Davis, et al, 1998). Pada penelitian ini dibangun sebuah sistem generator denah meja ujian agar setiap meja ujian memiliki kode soal yang berbeda dari meja tetangganya baik secara vertikal, horizontal dan diagonal dengan mengimplementasikan algoritma backtracking. Pengujian kemudian dilakukan pada matriks dengan berbagai dimensi dimulai dari jumlah kode soal 1 hingga 9. Dari hasil pengujian disimpulkan bahwa untuk kode soal < 4, persoalan dinyatakan tidak akan memiliki solusi kecuali jumlah baris atau kolom pada matriks juga < 4. Untuk jumlah kode soal ≥ 4, persoalan pastilah memiliki solusi berapapun dimensi matriksnya. Kata Kunci: menyontek, algoritma backtracking, generator denah meja ujian, matriks, pembagian kode soal ujian. Some research have identified that the most commonly cheating technique used while exam are exchanging the exam answers with other classmates who sit at the closest range then copying their answer sheet without being noticed (Davis, et al, 1998). In this paper, exam class generator was built by implementing backtracking algorithm in order to arrange exam sheets, so each cell has different code with the cell around. The testing of system then performed on some matrix variety which have sum of exams code within 1 to 9. The results shows, for sum of code < 4, each case will never has any solution unless row or column of the matrix is also < 4. And for sum of code ≥ 4, every case will have solution regardless of the matrix dimension. Keyword: cheat in exam, backtracking algorithm, exam class generator, matrix, distribution of exams sheets

    What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios

    Get PDF
    The modernisation of the power grid is ongoing, and the level of digitalisation of the power grid in, say, ten years may be quite different than today. Cyber security needs will change correspondingly. In this paper we utilise a qualitative research approach to explore misuse cases related to three main areas of modernisation that we envision for the next ten year period: 1) managing flexibility in the TSO-DSO relation, 2) smart distribution grids, and 3) microgrids. The misuse cases represent potential security challenges to be considered when working on modernising the grid, however they are not exhaustive. The misuse cases presented in this paper can contribute to identifying security requirements, thus reducing associated cyber risks, and assist in development of new cyber security mechanisms for the next-generation power grid employing digitally-connected, self-healing, and automation characteristics.acceptedVersio

    Tool-assisted Threat Modeling for Smart Grid Cyber Security

    Get PDF
    Threat modeling is about identifying architectural flaws and weaknesses in a system in order to mitigate them and avoid unwanted incidents caused by an attacker. Tool assisted threat modeling has seen limited use in complex cyber physical systems involving both Information Technology (IT) and Operational Technology (OT) systems. In this paper, we investigate the applicability of tool-assisted threat modeling to the complex cyber-physical system that is the smart grid, and present a new Smart Grid template for the Microsoft Threat Modeling Tool. We demonstrate benefits of our smart grid threat modeling template on a use-case, and discuss limitations.acceptedVersio

    Influencing the security prioritisation of an agile software development project

    Get PDF
    Software security is a complex topic, and for development projects it can be challenging to assess what security is necessary and cost-effective. Agile Software Development (ASD) values self-management. Thus, teams and their Product Owners are expected to also manage software security prioritisation. In this paper we build on the notion that security experts who want to influence the priority given to security in ASD need to do this through interactions and support for teams rather than prescribing certain activities or priorities. But to do this effectively, there is a need to understand what hinders and supports teams in prioritising security. Based on a longitudinal case study, this article offers insight into the strategy used by one security professional in an SME to influence the priority of security in software development projects in the company. The main result is a model of influences on security prioritisation that can assist in understanding what supports or hinders the prioritisation of security in ASD, thus providing recommendations for security professionals. Two alternative strategies are outlined for software security in ASD – prescribed and emerging – where we hypothesise that an emerging approach can be more relevant for SMEs doing ASD, and that this can impact how such companies should consider software security maturity.publishedVersio

    Needs and Challenges Concerning Cyber-Risk Assessment in the Cyber-Physical Smart Grid

    Get PDF
    Cyber-risk assessment methods are used by energy companies to manage security risks in smart grids. However, current standards, methods and tools do not adequately provide the support needed in practice and the industry is struggling to adopt and carry out cyber-risk assessments. The contribution of this paper is twofold. First, we interview six companies from the energy sector to better understand their needs and challenges. Based on the interviews, we identify seven success criteria cyber-risk assessment methods for the energy sector need to fulfill to provide adequate support. Second, we present the methods CORAS, VAF, TM-STRIDE, and DA-SAN and evaluate the extent to which they fulfill the identified success criteria. Based on the evaluation, we provide lessons learned in terms of gaps that need to be addressed in general to improve cyber-risk assessment in the context of smart grids. Our results indicate the need for the following improvements: 1) ease of use and comprehensible m ethods, 2) support to determine whether a method is a good match for a given context, 3) adequate preparation to conduct cyber-risk assessment, 4) manage complexity, 5) adequate support for risk estimation, 6) support for trustworthiness and uncertainty handling, and 7) support for maintaining risk assessments.acceptedVersio

    Accountability Requirements in the Cloud Provider Chain

    Get PDF
    In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduce additional accountability challenges, with many stakeholders involved. Symmetry is very important in any requirements’ elicitation activity, since input from diverse stakeholders needs to be balanced. This article ventures to answer the question “How can one create an accountable cloud service?” by examining requirements which must be fulfilled to achieve an accountability-based approach, based on interaction with over 300 stakeholders.publishedVersio

    Prioritisation of security an agile software development projects

    No full text
    Agile software development is driven by business value, and strives towards visible progressthrough features. Consequently, the somewhat invisible and overarching aspect of softwaresecurity is at the risk of being neglected.A key assumption of this thesis is that to achieve adequate security within acceptable costs(“good enough” security), software development projects need to be able to make priorities onwhat security is needed throughout development. The thesis addresses the following overallresearch problem:How can regular security prioritisation be integrated into agile softwaredevelopment so that software products end up with a level of security that is “good enough”?To this end, the thesis investigates 1) what influences the security prioritisation throughout anagile software development project, and 2) how security roles and activities can support an agilesoftware development project in reaching a “good enough” prioritisation of security.The research follows a design science approach, studying and designing process support forcompanies wanting to improve their software security prioritisation. The investigation is centredon small and medium sized companies developing “normal” software, i.e., software that is notsecurity critical nor has security as a key feature of the product. The need for trade-offs andprioritisations between security and other software aspects is likely to be more pressing whensecurity is not a main development goal, and smaller companies have been identified as having ahigher potential for improvement in their software security compared to larger companies.The thesis suggests that to improve prioritisation of security in agile software development,companies can apply regular security prioritisation meetings, and security experts in the companycan be empowered with knowledge on how to influence the security priority. The foundation forthis suggestion is documented in a collection of papers. The thesis offers the following maincontributions that are aimed towards both practitioners and researchers: 1) A conceptual modelof the influences on security priority in agile software development, 2) Identified and evaluatedstrategies that security experts can take in influencing the security priority of agile softwaredevelopment projects, 3) A new and evaluated meeting approach for continuous software securityin agile software development, and 4) Rich descriptions of practical experiences with improvingsoftware security prioritisation, bridging the gap between science and practice

    Security Threats in Demo Steinkjer. Report from the Telenor-SINTEF collaboration project on Smart Grids

    Get PDF
    This report describes security threats associated with the deployment of an Advanced Metering Infrastructure (AMI) in the Demo Steinkjer demonstration project. The description is based on the first phase of the actual smart meter roll-out in Steinkjer, but is kept on a vendor-neutral level. This document should thus be relevant for all other Distribution System Operators choosing a similar configuration for their AMI. The work described in this report has been performed by SINTEF with funding from Telenor, as a contribution to the Demo Steinkjer project organised under the auspices of the Norwegian Smart Grid Centre. Additional contributions have been received from NTNU, NTE and Aidon
    • …
    corecore