Misuse Cases Claude Turner. Outline Introduction Misuse Cases Example 1 Example 2 Tool Support for Use and Misuse Cases.

Slides:



Advertisements
Similar presentations
Division of Information Management Engineering User Interface Laboratory 11 Fall 09 Human Interface UI Evaluating Design Proposals for Complex Systems.
Advertisements

STRUCTURES & STRATAGIES PRINCIPLES OF PLACE
2009 – E. Félix Security DSL Toward model-based security engineering: developing a security analysis DSML Véronique Normand, Edith Félix, Thales Research.
4 Information Security.
Project management Project manager must;
CSC 593: Secure Software Engineering SeminarSlide #1 Misuse Cases: Use Cases With Hostile Intent Ian Alexander.
CHAPTER 4 Information Security. Announcements Project 2 – due today before midnight Tuesday Class Quiz 1 – Access Basics Questions/Comments.
Instructor: Tasneem Darwish
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
SE 555 Software Requirements & Specification 1 Misuse Cases.
Applied Software Project Management Andrew Stellman & Jennifer Greene Applied Software Project Management Applied Software.
Engineering Secure Software. Lottery Story A Threat We Can’t Ignore  Documented incidents are prevalent Carnegie Melon’s SEI has studied over 700 cybercrimes.
Modern Portfolio Concepts
Wonga example Register Question- What risks do you think businesses face due to IT developments?
REMOTE CONTROL CARS Jonathan Chandler CSCE April 21, 2011.
1 REQUIREMENTS ENGINEERING and SYSTEMS ANALYSIS Elements and Definitions.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Consensus Hunt Game Click here to continue Click here to continue.
1 User Interface Design CIS 375 Bruce R. Maxim UM-Dearborn.
L&C Catalog Content on Certificates of Completion within Management.
Can Programmers do Course Design?. The Programmer.
Chapter 14 The Monetary Policy Approach to Stabilization.
Software Engineering CS B Prof. George Heineman.
1 REQUIREMENT ENGINEERING Chapter 7. 2 REQUIREMENT ENGINEERING Definition Establishing what the customer requires from a software system. OR It helps.
Applying a Goal-Oriented Method for Hazard Analysis: A Case Study Sam Supakkul The University of Texas at Dallas Lawrence Chung The.
Learning basic safety precautions can help a person avoid threatening or harmful situations.
From Use Cases to Test Cases 1. A Tester’s Perspective  Without use cases testers will approach the system to be tested as a “black box”. “What, exactly,
A GENERIC PROCESS FOR REQUIREMENTS ENGINEERING Chapter 2 1 These slides are prepared by Enas Naffar to be used in Software requirements course - Philadelphia.
7 Information Security.
Section 1 Basic Elements of Economics. The story of wealth and health for 200 countries over 200 years.
10/12/ Recall The Team Skills 1. Analyzing the Problem (with 5 steps) 2. Understanding User and Stakeholder Needs 1. Interviews & questionnaires.
CS 325: Software Engineering February 12, 2015 Applying Responsibility-Assignment Patterns Design Patterns Situation-Specific Patterns Responsibility-Assignment.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Module 2: Creating a Plan for Network Security. Overview Introduction to Security Policies Designing Security by Using a Framework Creating a Security.
System Analysis: Case Study. System Analysis Overview It is one of the most important phases of the whole system development. Generally, the whole process.
The Evolution of ICT-Based Learning Environments: Which Perspectives for School of the Future? Reporter: Lee Chun-Yi Advisor: Chen Ming-Puu Bottino, R.
® IBM Software Group © 2006 IBM Corporation Writing Good Use Cases Module 1: Introduction to Use-Case Modeling.
A Use Case Primer 1. The Benefits of Use Cases  Compared to traditional methods, use cases are easy to write and to read.  Use cases force the developers.
Engineering e-Business Applications for Security DISCUSSANT GERALD TRITES, FCA, CA*IT/CISA.
TESTING LEVELS Unit Testing Integration Testing System Testing Acceptance Testing.
OSLC PLM Workgroup visit URL for terms of usage1 OSLC PLM Workgroup PLM Scenarios Systems Engineering scenario “Systems Engineer Reacts to Changed Requirements”
Information Systems Analysis and Management Modeling Sys. Requirements with Use Cases Arnie Lund, Jeffrey Kim May 5, 2009 INFO380.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Misuse Cases: Use Cases with Hostile Intent Presented by: Frank Xu Gannon University.
Csci 490 / Engr 596 Special Topics / Special Projects Software Design and Scala Programming Spring Semester 2010 Lecture Notes.
Copyright ©2004 Virtusa Corporation | CONFIDENTIAL Requirement Engineering Virtusa Training Group 2004 Trainer: Ojitha Kumanayaka Duration : 1 hour.
Policies and Procedures Security+ Guide to Network Security Fundamentals Chapter 11.
The Concept of the “CLIOS Process”: Integrating the study of physical and policy systems using Mexico City as an example Presentation to the Engineering.
Professional Ethics and Responsibilities
1 Technical & Business Writing (ENG-715) Muhammad Bilal Bashir UIIT, Rawalpindi.
21/1/ Analysis - Model of real-world situation - What ? System Design - Overall architecture (sub-systems) Object Design - Refinement of Design.
Chapter 7 Part II Structuring System Process Requirements MIS 215 System Analysis and Design.
Enterprise Risk Management & IT Implications BADM 559 Megan Kasbohm.
1 Team Skill 3 Defining the System Part 1: Use Case Modeling Noureddine Abbadeni Al-Ain University of Science and Technology College of Engineering and.
Welcome to M301 P2 Software Systems & their Development
Recall The Team Skills Analyzing the Problem (with 5 steps)
CSCE 548 Secure Software Development Use Cases Misuse Cases
Managing Decision Making
CHAPTER 4 Information Security.
Information and documentation media systems.
THE BUSINESS ANALYSIS PROCESS MODEL
Reconnaissance Report Trillium Technologies
Social Engineering Attacks
Introduction Principles of Information Security, 2nd Edition
Introduction Principles of Information Security, 2nd Edition
Introduction to Systems Analysis and Design Stefano Moshi Memorial University College System Analysis & Design BIT
Engineering Secure Software
LECTURE 3: Requirements Engineering
A Field Guide to Insider Threat Helps Manage the Risk
Presentation transcript:

Misuse Cases Claude Turner

Outline Introduction Misuse Cases Example 1 Example 2 Tool Support for Use and Misuse Cases

Introduction

“Humans have analyzed negative scenarios ever since they first sat around Ice Age campfires debating the dangers of catching wooly rhinoceros: ‘What if it turns and charges us before it falls into the pit?’” Ian Alexander

A more recent scenario is ‘What if the hackers launch a denial of service attack?’ Modern systems engineers can employ a misuse case—the negative form of a use case—to document and analyze such scenarios. A misuse case is simply a use case from the point of view of an actor hostile to the system under design.” Ian Alexander

Misuse Cases

Misuse Case A use case that documents a negative scenario A use case from an attacker’s perspective or from an actor hostile to the system under design. Applies the concept of negative scenario in a use- case context. – A negative scenario is a situation that the system’s owner does not want to occur. – Example: business leaders, game planners, and military tacticians are familiar with the strategy of analyzing their opponents’ best moves as identifiable threats. – In contrast, a use case generally describes behavior the owner wants the system to possess. Represents what if type questions

Recursive Misuse and Use Cases Can develop misuse and use cases recursively, going from system to subsystem levels or lower as necessary Lower-level cases can highlight aspects not considered at higher levels, possibly forcing another analysis Approach offers rich possibilities for exploring, understanding, and validating the requirements in any direction

Example 1 (Figure 1)

Example 1 Like a game (ex. Chess or Draft): “a team’s best strategy consists of thinking ahead to the other team’s best move and acting to block it.” In the figure, use cases appear on the left, and misuse cases are on the right Misuse threat: car theft Use case actor: lawful driver Misuse actor: car thief Risk: driver’s freedom to drive the car if thief can steal it

Example 1 Top-level analysis: driver must be able to lock the car (a derived requirement) to mitigate the threat Next-level analysis (thief’s response): if thief breaks the door lock and shorts the ignition, this requires another mitigating approach – such as, locking the transmission Thus, threat and mitigation forms a balanced zigzag.

Example 2 (Figure 2)

Example 2—Design Tradeoffs (satisfying conflicting user demands) Each design choice opens up new possibilities for both use and misuse Designers must therefore tradeoff one option against the other Example: – Web portal users must be able to access the provided services – Access can be threatened by a variety of security assaults (e.g., sabotage by rogue employees, sophisticated attacks by hackers)

Example 2—Design Tradeoffs (usability) Security can threaten system use if it is so strict that it frustrates lawful users (usability) and leads them to seek alternative services But, loose control that are more comfortable for such users invite misuse Figure 2 illustrates these dilemmas by adding “aggravates” and “conflicts with” relationships between cases

Usability and Misuse Cases Can also apply misuse case solutions to usability, as when a novice operator confused by the user interface becomes a negative agent

Tool Support for Use and Misuse Cases DOORS requirements management tool Scenario Plus (free set of add-ons for doors

References Alexander, I. (2003). Misuse Cases: Use Cases with Hostile Intent. IEEE Software,