论文标题

通过研究遵守建议,启发中小企业对网络安全解决方案的要求

Elicitation of SME Requirements for Cybersecurity Solutions by Studying Adherence to Recommendations

论文作者

Shojaifar, Alireza, Fricker, Samuel A., Gwerder, Martin

论文摘要

中小型企业(SME)已成为我们在网络攻击中经济中薄弱的地方。这些公司的数量很大,通常没有适当的控制来防止成功攻击,因此没有准备好系统地管理其网络安全功能。许多中小企业不采用网络安全的原因之一是,网络安全解决方案的开发人员对中小企业的背景几乎不了解和成功使用这些解决方案的要求。我们通过研究网络安全专家如何向中小型企业提供建议来提高要求。专家建议提供有关解决方案的重要功能以及这些功能应如何用于缓解网络安全威胁的信息。采用建议暗示了解决方案的正确匹配,因此成功考虑了要求。放弃的建议指出了一个未对准的建议,可以用作查询错过要求的来源。采用或放弃决策的重新出现证实了要求的存在。该海报描述了中小企业在网络安全方面面临的挑战,并介绍了我们提出的方法来引发网络安全解决方案的要求。海报描述了Cysec,我们的工具用于捕获网络安全建议,并有助于扩展网络安全要求引起的启发到大量参与的中小企业。最后,我们概述了计划的研究以开发和验证CYSEC。

Small and medium-sized enterprises (SME) have become the weak spot of our economy for cyber attacks. These companies are large in number and often do not have the controls in place to prevent successful attacks, respectively are not prepared to systematically manage their cybersecurity capabilities. One of the reasons for why many SME do not adopt cybersecurity is that developers of cybersecurity solutions understand little the SME context and the requirements for successful use of these solutions. We elicit requirements by studying how cybersecurity experts provide advice to SME. The experts recommendations offer insights into what important capabilities of the solution are and how these capabilities ought to be used for mitigating cybersecurity threats. The adoption of a recommendation hints at a correct match of the solution, hence successful consideration of requirements. Abandoned recommendations point to a misalignment that can be used as a source to inquire missed requirements. Re-occurrence of adoption or abandonment decisions corroborate the presence of requirements. This poster describes the challenges of SME regarding cybersecurity and introduces our proposed approach to elicit requirements for cybersecurity solutions. The poster describes CYSEC, our tool used to capture cybersecurity advice and help to scale cybersecurity requirements elicitation to a large number of participating SME. We conclude by outlining the planned research to develop and validate CYSEC.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源