DocumentCode
1833503
Title
User-Centered Information Security Policy Development in a Post-Stuxnet World
Author
Faily, Shamal ; Fléchais, Ivan
Author_Institution
Dept. of Comput. Sci., Univ. of Oxford, Oxford, UK
fYear
2011
fDate
22-26 Aug. 2011
Firstpage
716
Lastpage
721
Abstract
A balanced approach is needed for developing information security policies in Critical National Infrastructure (CNI) contexts. Requirements Engineering methods can facilitate such an approach, but these tend to focus on either security at the expense of usability, or vice-versa, it is also uncertain whether existing techniques are useful when the time available for applying them is limited. In this paper, we describe a case study where Usability and Requirements Engineering techniques were used to derive missing requirements for an information security policy for a UK water company following reports of the Stuxnet worm. We motivate and describe the approach taken while carrying out this case study, and conclude with three lessons informing future efforts to integrate Security, Usability, and Requirements Engineering techniques for secure system design.
Keywords
security of data; systems analysis; water supply; Stuxnet worm; UK water company; balanced approach; critical national infrastructure; requirements engineering method; requirements engineering technique; usability technique; user-centered information security policy development; Analytical models; Context; Information security; Interviews; Unified modeling language; Usability; CAIRIS; KAOS; misuse cases; personas;
fLanguage
English
Publisher
ieee
Conference_Titel
Availability, Reliability and Security (ARES), 2011 Sixth International Conference on
Conference_Location
Vienna
Print_ISBN
978-1-4577-0979-1
Electronic_ISBN
978-0-7695-4485-4
Type
conf
DOI
10.1109/ARES.2011.111
Filename
6046026
Link To Document