5038/2009: The Electronic Society Systems Thinking.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Are you Resilient? Diane Howorth Business Development Manager European Telecommunications Resilience & Recovery Association.
TEEB Training Session 4: Criticisms of valuation.
CS5038: The Electronic Society Security 2: Concepts of Security.
IT Project Management AN INTRODUCTION TO ETHICS
5038/2009: The Electronic Society Systems Thinking, Systems Sciences & Systems Modelling.
The Top 10 Reasons Why Federated Can’t Succeed And Why it Will Anyway.
Auditing Concepts.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 4: Modeling Decision Processes Decision Support Systems in the.
Lecture 11 Reliability and Security in IT infrastructure.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 2 Slide 1 Systems engineering 1.
Problem solving in project management
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Chapter 1- Introduction
Chapter 1- Introduction Lecture 1 Ready, fire, aim (the fast approach to software development). Ready, aim, aim, aim, aim... (the slow approach to software.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Margaret J. Cox King’s College London
1 BTEC HNC Systems Support Castle College 2007/8 Systems Analysis Lecture 9 Introduction to Design.
Discussing “Risk Analysis in Software Design” 1 FEB Joe Combs.
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
IT Infrastructure Chap 1: Definition
1. 2 IMPORTANCE OF MANAGEMENT Some organizations have begun to ask their contractors to provide only project managers who have been certified as professionals.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Distributed Systems: Concepts and Design Chapter 1 Pages
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
OPERATING SYSTEMS Goals of the course Definitions of operating systems Operating system goals What is not an operating system Computer architecture O/S.
Doc.: IEEE 802 ec-12/0006r0 Submission Liaison presentation to SC6 regarding Internet Security Date: 2012-February-13 Authors: IEEE 802 LiaisonSlide 1.
Success in project management In one way or another you will all have some experience of managing projects. You will most certainly have been doing this.
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
LEVEL 3 I can identify differences and similarities or changes in different scientific ideas. I can suggest solutions to problems and build models to.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Topic 5: Basic Security.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Carnegie Mellon University © Robert T. Monroe Management Information Systems Making Better MIS Investment Decisions Management.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Basic Security Concepts University of Sunderland CIT304 Harry R Erwin, PhD.
©Ian Sommerville 2000Dependability Slide 1 Chapter 16 Dependability.
EVALUATION RESEARCH To know if Social programs, training programs, medical treatments, or other interventions work, we have to evaluate the outcomes systematically.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
1.Why it is important to study and understand information systems. 2.Distinguish data from information. 3.Name the components of an information system.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Computer Security Sample security policy Dr Alexei Vernitski.
For More Tutorials ACC 210 WEEK 1 DQ 1  How does information flow between departments at your organizations? Why do some organizations.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Sociology 125 Lectures 19 & 20 DEMOCRACY: HOW IT WORKS November 11 & 16, 2010.
1.3 Operating system services An operating system provide services to programs and to the users of the program. It provides an environment for the execution.
Information Systems Chapter 1 An Introduction to Information Systems.
CHALLENGES, TRENDS AND EVALUATION OF MERGING PROCESSES CIAT TECHNICAL CONFERENCE Paris October 2010 By: Victor van Kommer Director Knowledge Centre.
 Overview of Project management. ◦ Management. ◦ Project Management. ◦ Software Project Management. ◦ Project(Dimensions, Characteristics, Complexity,
SECURITY CYBER CRIME AND ABUSE
OPERATING SYSTEMS CS 3502 Fall 2017
Lecture 3: Procedures of extension work
Lecture 6. Information systems
Personal Mobile Device Acceptable Use Policy Training Slideshow
WTF… About the unsecurity of IoT
Presentation transcript:

5038/2009: The Electronic Society Systems Thinking

Systems Thinking (slide from Frank Guerin’s intro lect) Systems, which perform functions and provide services, are complex assemblies and combinations of technological, human/social, economic, and policy components. How can we organize our understanding? How can model systems so that we can explore and reason about all of the interacting and conflicting components and requirements? How do systems fail? Systemic failure, component failure, individual culpability? Security examples.

Systems Thinking 1 What do we mean by systems? – What are the different parts? – People, Process, and Technology (PPT): Socio- economic-technical systems. – Multi-layered systems. Why do systems fail? – Component failure. – Integration failure. – Unforeseen circumstances.

Distributed Systems Definition of a Distributed System: – A collection of autonomous information-processing devices connected by a network supporting data transmissions between devices – Managed by software that is designed to support an integrated computing facility that delivers services to users and other systems Examples: the Internet; your home network; a bank’s account management systems, the Met Office’s network of sensors So, different levels of abstraction matter

More abstractly … The system has a boundary between itself and its environment The system itself consists in – A collection of locations – A collection of resources at each location – A collection of processes that execute at locations using the available resources The environment is represented stochastically, events begin incident upon the system according to a probability distribution.

A System Model R1R2…R1R2… processes manipulate resources events L1L1 L2L2 …

Example Boats entering a harbour: – Arrive from the sea (the environment) according to an exponential distribution (simple gives an arrival rate) – Locations: holding area; jetties – Resources: tugs, cranes, stevedores – Process: a boat itself, arrives from sea collects tugs, docks at a jetty, uses a crane, collects tugs, returns to sea Even has its own iPhone app (Harbour Master)

A Security Example The use of USB sticks by the employees of a major bank. USB sticks used for good reasons. But usage leads to a range of information security vulnerabilities. How to protect?

USB locations Home Client’s Office Office Transport Each location has different vulnerabilities, threats, and protection

The USB Model Process: lifecycle of a stick (cf. a boat) The stick accesses resources at the various locations; e.g., a port on computer (cf. tug) As the stick moves around the locations, it is subject to different threats. Examples? Thieves, for example, might be part of the environment. So, model arrival of a thief in the same train carriage of the stick using a probability distribution Likelihood of data loss depends on things like the probability stick’s owner used its encryption …

How to use the model? Run simulations to understand the consequences of different design choices: a simulation modelling tool that captures this is Core Gnosis, available from Use logical methods to reason about properties of the system. Don’t worry, this is beyond the scope of this course − involves heavy mathematical logic ….

Example How can data be lost from USB sticks: – Stick lost on train – Stick corrupted by malware on a home computer – Stick connected to client’s computer, other clients’ files accidently copied – … Solutions?

Encryption? Is this a good solution?

Yes, because if sticks are always encrypted, then there is very little risk of date being lost

No, because encryption significantly impedes productivity: – Typing passwords takes time – Have to find the find right stick – Passwords tend to be forgotten At clients’ premises, a forgotten password is very embarrassing, particularly in the City of London culture.

Trade-offs In fact, there is a trade-off between security (confidentiality) and productivity The nature of this trade-off can be analysed using methods from economics The key idea is that of a utility function

Utility (again; cf. Security lectures) In economics, utility theory is used to understand how agents use (expected) valuations of (expected) outcomes to make decisions/choices To use utility theory, it’s necessary to understand the problem in a fair degree of detail, but also to remember to stick with the level of abstraction that’s appropriate for what you’re trying to achieve Einstein: A scientific theory should be as simple as possible, but no simpler. Can be abused by the lazy, but applies well to modelling.

So, identify which resources you care about Identify what else in the model affects their values Typically, there will be a trade-off between some of things you care about, such as confidentiality and productivity BUT, you might not care about all things to the same extent: e.g., weightings for conf. and prod.

Shape of Utility Associated with each of confidentiality and productivity, and indeed cost/investment, might be a target level Targets can be missed both above and below

As manager, you might also care more about some of confidentiality, C, productivity, P, and investment, K, than the others. So the utility function gives different weightings Overall U(C, P, K) = w 1 f 1 (C) + w 2 f 2 (P) + w 3 f 3 (K) Each of C, P, K depends on the system itself Compare with Security notes

The can explore how the utility function changes as the system is reconfigured This approach used to explore the value of applying encryption to the USB sticks used by the bank’s employees

Conclusion of USB study Encryption is only justified − in terms of the trade-off between confidentiality, productivity, and cost − if the bank’s staff includes traitors who are deliberately trying to undermine its security In which case, they’ll find other ways anyway … Of course, different preferences, such as a strong preference for C over P, might produce different answers.

Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security. Proc. WEIS In Managing Information Risk and the Economics of Security. M. Eric Johnson (editor), Springer, 2009: Proc. WEIS In Managing Information Risk and the Economics of Security. M. Eric Johnson (editor), Springer, 2009: Available from pdf Available from pdf