2019 Annual INCOSE Western States Regional Conference (WSRC)

Systems Security Engineering

Mehrdad Sharbaf, Ph.D.

Adjunct Professor CSUDH

Chair CLAS IEEE Computer Society Chapter

Objective

Agenda

Problem related to information security

Introduction to Information Security

Security Goals

IS-CIA-Triad.png

Security Goals

IS-CIA-Triad.png

Security Goals

IS-CIA-Triad.png

System Engineering

System Engineering

https://www.incose.org/images/default-source/new-website-design/syseng-graphical-representation-website.png?sfvrsn=4

Definition of a “system”

“System design is the process or art of defining the hardware and software architecture, components, modules, interfaces, and data for a computer system to satisfy specified requirements.”

https://ops.fhwa.dot.gov/publications/fhwahop13013/images/f10.png

Some examples of System and software development models

Systems Security Engineering

Systems Security Engineering

Process Models

System Development Life Cycle (SDLC)

SDLC

security requirements elicitation and definition,

secure design based on design principles for security,

use of static analysis tools,

reviews and inspections, security testing, etc..

verification, validation, expert review,

artifact review, and evaluations.

SDLC

Capability Maturity Models (CMM)

Systems SecurityEngineering CMM

SSE-CMM

Security Engineering Process

Security Risk Process

Security is part of Engineering

Assurance

Process Areas

Process Areas related to project and

Organizational practices

Process Areas related to Security

Engineering process areas

Design for security

Architectural design

Protection

Layered protection

30

Design guidelines

Design guidelines 1

Design guidelines 2

Survivability strategies

NIST Systems Security Engineering Initiative

NIST-Systems Security Engineering

NIST-Systems Security Engineering

NIST-Role of Systems Security Engineering

NIST-SYSTEMS SECURITY ENGINEERING FRAMEWORK

The Problem Context

The Solution Context

The Trustworthiness Context

SYSTEM LIFE CYCLE PROCESSES SYSTEM SECURITY IN SYSTEM LIFE CYCLE PROCESSES

SSE contributes to all SE life cycle processes – with emphasis on the Technical Processes

SECURITY IN SYSTEM LIFE CYCLE PROCESSES

PROCESS NAMES AND DESIGNATORS

SYSTEMS SECURITY ENGINEERING KEY POINTS

Analysis Classes

48

Static analysis examines the system without executing it and can be applied to design representations, source code, binaries, and bytecode. Tools include attack modeling, source code analyzers, obfuscated code detection, bytecode or binary disassembly, human review/inspection, origin analysis, digital signature verification, configuration checking, permission manifest analysis, development/sustainment version control, deliberate obfuscation, rebuild and compare, and formal methods.

Dynamic analysis examines the system execution, giving it specific inputs and examining results and/or outputs. Tools and techniques include network scanner, network sniffer, network vulnerability scanner, host-based vulnerability scanner, fuzz tester, framework-based fuzzer, negative testing, digital forensics, intrusion detection systems/intrusion prevention systems, automated monitored execution, forced path execution, firewall, man-in-the middle attack tool, debugger, and fault injection.

Hybrid analysis applies to the tight integration of static and dynamic analysis approaches.

Reference: SOAR

Analysis Tools

49

Tools, Tools, Tools

50

Fortify

MAST

ASTaaS

IST

Regshot

AFIC

TRIPWIRE

FCIV

SIGVERIF

Starter

SrvMan

DriverMax

MONIT

LSK 5.0

ACAS

Coverity

CodeSonar

Checkmarx

FindBugs

Gendarme

System Security Engineering Assistant Tool

System Security Engineering Assistant

Tools

References