skip to main content
research-article
Free Access

Engineering trustworthy systems: a principled approach to cybersecurity

Published:21 May 2019Publication History
Skip Abstract Section

Abstract

Cybersecurity design reduces the risk of system failure from cyberattack, aiming to maximize mission effectiveness.

References

  1. Avizienis, A., Laprie, J.-C., and Randell, B. Fundamental concepts of dependability. In Proceedings of the 3<sup>rd</sup> IEEE Information Survivability Workshop (Boston, MA, Oct. 24--26). IEEE, 2000, 7--12.Google ScholarGoogle Scholar
  2. Hamilton, S.N., Miller, W.L., Ott, A., and Saydjari, O.S. The role of game theory in information warfare. In Proceedings of the 4<sup>th</sup> Information Survivability Workshop. 2001.Google ScholarGoogle Scholar
  3. Hammond, S.A. and Mayfield, A.B. The Thin Book of Naming Elephants: How to Surface Undiscussables for Greater Organizational Success. McGraw-Hill, New York, 2004, 290--292.Google ScholarGoogle Scholar
  4. Morgan, S. Top 5 Cybersecurity Facts, Figures and Statistics for 2018. CSO Online; https://bit.ly/2KG6jJV.Google ScholarGoogle Scholar
  5. NASA. Report of the Presidential Commission on the Space Shuttle Challenger Accident. June 6, 1986; https://history.nasa.gov/rogersrep/genindex.htmGoogle ScholarGoogle Scholar
  6. Rand Corporation. Foundations of Effective Influence Operations: A Framework for Enhancing Army Capabilities. Rand Corp. 2009; https://www.rand.org/content/dam/rand/pubs/monographs/2009/RAND_MG654.pdfGoogle ScholarGoogle Scholar
  7. Saydjari, O.S. Why Measure? Engineering Trustworthy Systems. McGraw-Hill, New York, 2018, 290--292.Google ScholarGoogle Scholar
  8. Saydjari, O.S. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time. McGraw-Hill Education, 2018.Google ScholarGoogle Scholar
  9. Wiegmann, D. and Shappell, S.A. A Human Error Approach to Aviation Accident Analysis: The Human Factors Analysis and Classification System. Ashgate Publishing, 2003.Google ScholarGoogle Scholar
  10. Zarate, J.C. The Cyber Attacks on Democracy. The Catalyst 8, (Fall 2017); https://bit.ly/2IXttZrGoogle ScholarGoogle Scholar

Index Terms

  1. Engineering trustworthy systems: a principled approach to cybersecurity

    Recommendations

    Reviews

    Eduardo B. Fernandez

    In this article-an extract of his book on 223 security principles [1]-Saydjari discusses the ten "most fundamental" principles. Both the book and article are addressed to software engineers who want to build secure systems. Cybersecurity technology is advancing too slowly to keep pace with threats, and system designers need principles in order to do a better job. My own experience analyzing recent attacks (Equifax, Uber, Sony, Capital One, and so on) shows that these attacks succeeded not because they were impossible to stop, but because management made the deliberate decision to not spend money and effort on protecting customer data. In fact, the attacks were very simple, but the systems were quite naked. The proposed principles are all well known [2,3,4,5], which confirms that the problem is not a lack of cybersecurity knowledge but a failure to apply this knowledge. Even companies that develop security-critical systems such as Microsoft or Adobe don't use the most advanced secure systems development methodologies, relying instead on secure coding and code analysis. While having a list of principles as a guide when building systems is better than nothing, I doubt that developers will be able to apply 223 principles without the support of a systematic methodology. I have found that the use of security architectural patterns is an effective way to implicitly apply principles, and after surveying a variety of approaches to secure software design [6], I believe that model-based methodologies are the only hope to produce systems with a high level of security and that comply with privacy and other regulations. However, we first need government regulations that punish institutions that do not protect the data in their trust, as the European regulations do. Until that happens, cyberattacks will continue to succeed.

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Communications of the ACM
      Communications of the ACM  Volume 62, Issue 6
      June 2019
      85 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/3336127
      Issue’s Table of Contents

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 May 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Popular
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format