zones, which help to understand allowed and
forbidden information flows within and between
these zones. We call the resulting model a DFDsec.
The model enables a threat analysis on
interconnections, especially between the identified
security zones, in order to determine operational
nodes which are most endangered by the threat of
losing confidentiality, availability or integrity. We
discussed an initial approach for quantifying the
security importance of all nodes, based on the given
DFDsec structure. This helps to rank and prioritize
operational nodes in their importance for necessary
security improvements and mitigation efforts. This
approach can be used already in the early phase of
the development phase which helps reducing costs.
The DFDsec methodology is work in progress.
Future work will focus on the further analysis of
structural properties in the data flow representation.
We also aim for a quantitative analysis approach,
where data flow edges are parametrized with attack
potentials. This would allow an even more precise
identification of vulnerable operational nodes.
Another future topic is the application of the
methodology in a practical context, such as the
German armed forces IT infrastructure.
REFERENCES
Bell, D. E., LaPadula, L. J., 1976. Secure computer
system: Unified Exposition and Multics Interpretation,
Technical Report ESD-TR-75-306, MITRE Corp.
MTR-2997, Bedford, MA.
Biba, K. J., 1976. Integrity considerations for secure
computer systems, Technical Report ESD-TR-76-372,
MITRE Corp. MTR-3153, Bedford, MA.
Cisco, 2016. Cisco 2016 Annual Security Report.
Cyberedge Group, 2015. 2015 Cyberthreat Defense
Report.
DeMarco, 1978. T. Structured Analysis and System
Specification, Yourdon Press, New York, NY.
Denning, D. E., 1976. A lattice model of secure
information flow, Communications of the ACM,
19(5):236-243.
Denning, D. E. and Denning, P. J., 1977. Certification of
programs for secure information flow,
Communications of the ACM, 20(7):504-513.
Eckstein,C., 2015. Preventing data leakage: A risk based
approach for controlled use of the use of
administrative and access privileges, White Paper,
SANS Institute.
ENISA, 2017. ENISA Threat Landscape Report 2016.
European Parliament, Directorate General for Internal
Policies, Police Department A: Economic and
Scientific Policy, 2013. Data and Security Breaches
and Cyber-Security Strategies in the EU and its
International Counterparts.
Federal Office for Information Security (BSI), 2008.
Information Security Management Systems (ISMS),
BSI-Standard 100-1, Version 1.5.
Gane, C. and Sarson, T. 1977. Structured Systems
Analysis and Design, Improved Systems
Technologies, Inc., New York, NY.
Gemalto, 2016. Breach Level Index.
Genua gmbh, 2016. Datendiode vs-diode, Munich,
Germany: www.genua.de, Web-Access 06. April.
Gordon, P. 2007. Data Leakage Threats and Mitigation,
White Paper, SANS Institute.
Harrison, W. S., Hanebutte, N., Oman, P. W. and Alves-
Foss, J., 2005. The MILS Architecture for a Secure
Global Information Grid, The Journal of Defense
Software Engineering, pages 20-24.
HM Government, 2015. 2015 Information Security
Breaches Survey.
Identity Theft Resource Center, 2015. 2015 Data Breach
Stats.
Infodas, 2016. SDoT ® Security Gateway 5.0, Cologne,
Germany: www.infodas.de, Web-Access 06. April.
Infowatch, 2016. Global Data Leakage Report, H1 2016.
International Organization for Standardization, 2013. ISO
27001 Information technology - Security techniques -
Information security management systems Overview
and vocabulary, GE, SUI.
Mah, P. 2017. 7 Social Engineering Scams and How to
Avoid Them, www.cio.com, Web-Access 09. June.
Myers, A. C. and Liskov, B., 1997. A decentralized model
for information flow control, In SOSP 97: Proceedings
of the sixteenth ACM symposium on Operating
systems principles, pages 129142. ACM Press.
Ponemon Institute, 2016. 2016 Cost of Data Breach
Study: Global Analysis.
Rodgers, C. 2017. Data Classification: Why is it
important for Information Security?, SecureState
Blog: www.securestate.com, Web-Access 05. July.
Rushby, J. 1981. Design and Verification of Secure
Systems, ACM Operating Systems Review Vol. 15
No. 5 pages 12-21. ACM Press.
Schmidt, K., Tröger, P., Kroll, H., Bünger, T. et al., 2014.
Adapted Development Process for Security in
Networked Automotive Systems, SAE Int. J. Passeng.
Cars Electron. Electr. Syst. 7(2):516-526,
doi:10.4271/2014-01-0334.
Shostack, A., 2008. Experiences Threat Modeling at
Microsoft, In Workshop on Modeling Security,
Toulouse.
Torr, P. 2005. Demystifying the Threat-Modeling Process,
IEEE Security & Privacy Magazine, vol. 3, no. 5, pp.
66-70.
TrendLabs
SM
APT Research Team, 2012. Spear-Phishing
E-Mail: die beliebteste APT-Angriffstechnik}, Trend
Micro, Hallbergmoos, Germany.
Trustwave, 2015, 2015 Trustwave Global Security Report.
Verisign, 2016. Verisign Distributed Denial of Service
Trends Report, Volume 3, Issue 3.
Verizon, 2016. 2016 Data Breach Investigations Report.
Yourdon, E. 1989. Modern Structured Analysis, Yourdon
Press, Upper Saddle River, NJ.
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
250