Fundamentals of Secure System Modelling:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2017]
|
Schlagworte: | |
Online-Zugang: | Inhaltstext http://www.springer.com/ Inhaltsverzeichnis |
Beschreibung: | xx, 218 Seiten Illustrationen 23.5 cm x 15.5 cm |
ISBN: | 9783319617169 3319617168 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044626748 | ||
003 | DE-604 | ||
005 | 20180314 | ||
007 | t | ||
008 | 171115s2017 sz a||| |||| 00||| eng d | ||
016 | 7 | |a 1132526469 |2 DE-101 | |
020 | |a 9783319617169 |c Book : EUR 60.98 (DE) (freier Preis), EUR 62.69 (AT) (freier Preis), CHF 63.00 (freier Preis) |9 978-3-319-61716-9 | ||
020 | |a 3319617168 |9 3-319-61716-8 | ||
024 | 3 | |a 9783319617169 | |
028 | 5 | 2 | |a Bestellnummer: 978-3-319-61716-9 |
028 | 5 | 2 | |a Bestellnummer: 86841808 |
035 | |a (OCoLC)1014072667 | ||
035 | |a (DE-599)DNB1132526469 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a sz |c XA-CH | ||
049 | |a DE-355 | ||
082 | 0 | |a 004 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Matulevicius, Raimundas |e Verfasser |4 aut | |
245 | 1 | 0 | |a Fundamentals of Secure System Modelling |c Raimundas Matulevičius |
264 | 1 | |a Cham |b Springer |c [2017] | |
300 | |a xx, 218 Seiten |b Illustrationen |c 23.5 cm x 15.5 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
653 | |a UR | ||
653 | |a UR | ||
653 | |a KJQ | ||
653 | |a Systems Security | ||
653 | |a Software security engineering | ||
653 | |a Systems modeling | ||
653 | |a Risk management | ||
653 | |a Software development | ||
653 | |a UR | ||
710 | 2 | |a Springer International Publishing |0 (DE-588)1064344704 |4 pbl | |
776 | 0 | 8 | |i Elektronische Reproduktion |z 9783319617176 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-61717-6 |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4c4a51b9edbf4156b7c34dc10ac6a8c8&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m X:MVB |u http://www.springer.com/ |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030024884&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030024884 |
Datensatz im Suchindex
_version_ | 1806414284780994560 |
---|---|
adam_text |
Contents
1 Introduction. 1
1.1 System and Security Engineering. 1
1.2 Security and Security Risk Management Standards. 2
1.3 Security Development Approaches. 4
1.4 Domain-Specific Languages for Security Modelling. 4
1.5 Model-Driven Security. 5
1.6 Modelling Perspectives of Secure Software Systems. 6
1.7 Running Example. 9
1.8 Exercises. 12
Part I Security Risk Management
2 Domain Model for Information Systems Security Risk
Management. 17
2.1 Domain Model. 17
2.1.1 Asset-Related Concepts. 17
2.1.2 Risk-Related Concepts. 19
2.1.3 Risk Treatment-Related Concepts. 20
2.2 Relationships and Multiplicities. 20
2.3 Metrics. 22
2.4 Process. 22
2.5 ISSRM Application Example. 23
2.6 Further Reading. 27
2.7 Exercises. 29
3 Security Risk. 31
3.1 System Assets. 31
3.2 Risk Analysis. 33
3.3 Harm: Malicious Software. 34
3.4 Taxonomy of Security Errors. 36
3.5 Security Threats. 37
xv
\
xvi Contents
3.6 Threat Agent. 39
3.7 Further Reading. 41
3.8 Exercises. 41
4 Security Requirements. 43
4.1 Security Criterion. 43
4.2 Requirements Definition. 44
4.3 Security Requirements Classification. 45
4.4 How to Specify Security Requirements. 50
4.5 Related (to Security) Requirements. 52
4.6 Further Reading. 56
4.7 Exercises. 58
Part II Modelling Languages for Security Risk Management
5 Security Risk-OrientedBPMN. 63
5.1 Business Process Model and Notation. 63
5.2 Security Risk Management Using BPMN. 64
5.2.1 Semantics. 65
5.2.2 Abstract Syntax. 65
5.2.3 Concrete Syntax. 68
5.3 Example. 69
5.4 Further Reading.*. 72
5.5 Exercises. 75
6 Security Risk-Aware Secure Tropos. — 77
6.1 Tropos and Secure Tropos. 77
6.2 Security Risk Management Using Secure Tropos. 79
6.2.1 Semantics and Concrete Syntax. 79
6.2.2 Abstract Syntax . 81
6.3 Examples. 86
6.4 Further Reading.,. 89
6.5 Exercises. 91
7 Security Risk-Oriented Misuse Cases . 93
7.1 Use and Misuse Cases. 93
7.2 Security Risk Management Using Misuse Cases. 94
7.2.1 Semantics and Concrete Syntax. 94
7.2.2 Abstract Syntax. 95
7.3 Examples. 98
7.4 Textual Misuse Cases . 101
7.5 Further Reading. 103
7.6 Exercises. 104
8 Mal-activities for Security Risk Management. 107
8.1 Activity and Mal-activity Diagrams. 107
8.2 Security Risk Management Using Mal-activities . 108
Contents xvii
8.2.1 Semantics and Concrete Syntax. 108
8.2.2 Abstract Syntax. 110
8.3 Example. 112
8.4 Further Reading . 113
8.5 Exercises. 113
Part III Model-Driven Security Development and Application
9 Transformations Between Security Risk-Oriented Modelling
Languages. 119
9.1 Transformation Basis. 119
9.1.1 Transformation Method. 119
9.1.2 Comparison of Modelling Languages. 120
9.2 Transforming from Security Risk-Oriented BPMN
to Security Risk-Aware Secure Tropos. 125
9.3 Transforming from Security Risk-Aware Secure Tropos
to Security Risk-Oriented Misuse Cases. 129
9.4 Transforming from Security Risk-Oriented Misuse Cases
to Mal-activities for Security Risk Management. 135
9.5 Further Reading. —. 141
9.6 Exercises. 144
10 Role-Based Access Control. 147
10.1 Family of RBAC Models. 147
10.2 RBAC Administration. 149
10.3 RBAC Modelling Languages . 150
10.3.1 SecureUML. 150
10.3.2 UMLsec. 153
10.3.3 Comparison . 156
10.3.4 Transformation. 158
10.4 Model-Driven Security. 162
10.5 Further Reading. 165
10.6 Exercises. 167
11 Secure System Development Using Patterns. 171
11.1 Security Patterns. 171
11.2 Security Pattern Taxonomy. 172
11.3 Security Risk-Oriented Patterns. 174
11.4 Security Requirements Elicitation from Business Processes. 180
11.4.1 SREBP Method. 182
11.4.2 Pattern Application. 185
11.5 Further Reading. 193
11.6 Exercises. 194
\
xviii Contents
Part IV Concluding Remarks
12 Secure System Development. 199
12.1 Secure System Development Processes. 199
12.1.1 Microsoft Secure System Development Lifecycle. 200
12.1.2 OWASP CLASP. 201
12.1.3 Seven Touchpoints. 202
12.1.4 Comparison. 204
12.2 Security Approaches in Secure Systems Development
Processes. 204
12.3 Tools . 206
12.4 Exercises. 207
References. 209 |
any_adam_object | 1 |
author | Matulevicius, Raimundas |
author_facet | Matulevicius, Raimundas |
author_role | aut |
author_sort | Matulevicius, Raimundas |
author_variant | r m rm |
building | Verbundindex |
bvnumber | BV044626748 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1014072667 (DE-599)DNB1132526469 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV044626748</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180314</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">171115s2017 sz a||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1132526469</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319617169</subfield><subfield code="c">Book : EUR 60.98 (DE) (freier Preis), EUR 62.69 (AT) (freier Preis), CHF 63.00 (freier Preis)</subfield><subfield code="9">978-3-319-61716-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3319617168</subfield><subfield code="9">3-319-61716-8</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783319617169</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 978-3-319-61716-9</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 86841808</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1014072667</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1132526469</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">sz</subfield><subfield code="c">XA-CH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Matulevicius, Raimundas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fundamentals of Secure System Modelling</subfield><subfield code="c">Raimundas Matulevičius</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 218 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">23.5 cm x 15.5 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">UR</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">UR</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">KJQ</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Systems Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Software security engineering</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Systems modeling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Risk management</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Software development</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">UR</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Springer International Publishing</subfield><subfield code="0">(DE-588)1064344704</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Elektronische Reproduktion</subfield><subfield code="z">9783319617176</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-61717-6</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4c4a51b9edbf4156b7c34dc10ac6a8c8&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="u">http://www.springer.com/</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030024884&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030024884</subfield></datafield></record></collection> |
id | DE-604.BV044626748 |
illustrated | Illustrated |
indexdate | 2024-08-04T00:21:46Z |
institution | BVB |
institution_GND | (DE-588)1064344704 |
isbn | 9783319617169 3319617168 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030024884 |
oclc_num | 1014072667 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | xx, 218 Seiten Illustrationen 23.5 cm x 15.5 cm |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
spelling | Matulevicius, Raimundas Verfasser aut Fundamentals of Secure System Modelling Raimundas Matulevičius Cham Springer [2017] xx, 218 Seiten Illustrationen 23.5 cm x 15.5 cm txt rdacontent n rdamedia nc rdacarrier UR KJQ Systems Security Software security engineering Systems modeling Risk management Software development Springer International Publishing (DE-588)1064344704 pbl Elektronische Reproduktion 9783319617176 Erscheint auch als Online-Ausgabe 978-3-319-61717-6 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4c4a51b9edbf4156b7c34dc10ac6a8c8&prov=M&dok_var=1&dok_ext=htm Inhaltstext X:MVB http://www.springer.com/ Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030024884&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Matulevicius, Raimundas Fundamentals of Secure System Modelling |
title | Fundamentals of Secure System Modelling |
title_auth | Fundamentals of Secure System Modelling |
title_exact_search | Fundamentals of Secure System Modelling |
title_full | Fundamentals of Secure System Modelling Raimundas Matulevičius |
title_fullStr | Fundamentals of Secure System Modelling Raimundas Matulevičius |
title_full_unstemmed | Fundamentals of Secure System Modelling Raimundas Matulevičius |
title_short | Fundamentals of Secure System Modelling |
title_sort | fundamentals of secure system modelling |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4c4a51b9edbf4156b7c34dc10ac6a8c8&prov=M&dok_var=1&dok_ext=htm http://www.springer.com/ http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030024884&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT matuleviciusraimundas fundamentalsofsecuresystemmodelling AT springerinternationalpublishing fundamentalsofsecuresystemmodelling |