Lecture 14 - Security Engineering
Lecture 14 - Security Engineering
Part 1
The patient High. Required to support all High. Financial loss as clinics may have
database clinical consultations. Potentially to be cancelled. Costs of restoring system.
safety-critical. Possible patient harm if treatment cannot
be prescribed.
An individual Normally low although may be Low direct losses but possible loss of
patient record high for specific high-profile reputation.
patients.
Unauthorized user Low Only allow system Low cost of implementation but
gains access as system management from care must be taken with key
manager and makes specific locations distribution and to ensure that
system unavailable that are physically keys are available in the event of
secure. an emergency.
Unauthorized user High Require all users to Technically feasible but high-cost
gains access as system authenticate solution. Possible user resistance.
user and accesses themselves using a
Simple and transparent to
confidential biometric
implement and also supports
information mechanism.
recovery.
Log all changes to
patient information
to track system
usage.
Lecture 14 Security Engineering 11
Security requirements
Architectural design
how do architectural design decisions affect the security of a
system?
Good practice
what is accepted good practice when designing secure systems?
Design for deployment
what support should be designed into a system to avoid the
introduction of vulnerabilities when a system is deployed for
use?
Platform-level protection
Top-level controls on the platform on which a system runs.
Application-level protection
Specific protection mechanisms built into the application itself
e.g. additional password protection.
Record-level protection
Protection that is invoked when access to specific information is
requested
These lead to a layered protection architecture
Part 2
Security guidelines
Base security decisions on an explicit security policy
Fail securely
Resistance
Avoiding problems by building capabilities into the system to
resist attacks
Recognition
Detecting problems by building capabilities into the system to
detect attacks and failures and assess the resultant damage
Recovery
Tolerating problems by building capabilities into the system to
deliver services whilst under attack
System understanding
Review golas, requirements and architecture
Critical service identification
Identify services that must be maintained
Attack simulation
Devise attack scenarios and identify components affected
Survivability analysis
Identify survivability strategies to be applied