2019 IEEE International Systems Conference (SysCon) 2019
DOI: 10.1109/syscon.2019.8836929
|View full text |Cite
|
Sign up to set email alerts
|

A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 5 publications
0
7
0
1
Order By: Relevance
“…Khan, Madnick & Moulton (2018) demonstrated the implementation of STPA-Sec to identify security vulnerabilities of a central utilities plant gas turbine use case in industrial control systems. Mailloux et al (2019) used the STPA-Sec to elicit systems security requirements for a notional autonomous space system. Carter et al (2018) used STPA-Sec with a previous information elicitation process to analyze a small reconnaissance unmanned aerial vehicles.…”
Section: Stpa-sec Applications and Gapsmentioning
confidence: 99%
“…Khan, Madnick & Moulton (2018) demonstrated the implementation of STPA-Sec to identify security vulnerabilities of a central utilities plant gas turbine use case in industrial control systems. Mailloux et al (2019) used the STPA-Sec to elicit systems security requirements for a notional autonomous space system. Carter et al (2018) used STPA-Sec with a previous information elicitation process to analyze a small reconnaissance unmanned aerial vehicles.…”
Section: Stpa-sec Applications and Gapsmentioning
confidence: 99%
“…Khan et al (2018) demonstrated the implementation of STPA-Sec to identify security vulnerabilities of a central utilities plant gas turbine use case in industrial control systems. Mailloux et al (2019) used the STPA-Sec to elicit systems security requirements for a notional autonomous space system. Carter et al (2018) used STPA-Sec with a previous information elicitation process to analyze a small reconnaissance unmanned aerial vehicles.…”
Section: Stpa-sec Applications and Gapsmentioning
confidence: 99%
“…The pace of this development has increased over the decades, and beginning in the 1990's it became apparent that adversaries also had the capability to attack our sensitive military cyber-enabled systems and thus began an increased focus of developing and defining cybersecurity for systems. [1] Considering these threats, systems engineering must have appropriate tools and techniques for performing systems security engineering (SSE) and analysis. For example, recent United States Department of Defense (U.S. DoD)which has historically valued systems securityupdates have expanded assessments for all cyber-physical weapon systems [2] , [3], and efforts to standardize "Secure Cyber Resilient Engineering (SCRE) are underway [4].…”
Section: Introductionmentioning
confidence: 99%
“…In 2015, the International Council of Systems Engineering (INCOSE) dedicated a section in the INCOSE handbook version 4.0 for SSE, and in 2016 the National Institute of Science and Technology (NIST) published NIST SP 800-160 volume 1 focusing on SSE. These advances in the study and application of system security in recent years are representative of the increasing criticality of security in complex cyber physical systems, and the importance of defining and maintaining security requirements in the systems engineering lifecycle processes [1]. As our reliance on remote capabilities and cyber-physical systems continues to increase, the need is to secure these assets as much as practicable.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation