Goal-oriented security threat mitigation patterns: a case of credit card theft mitigation

  • Authors:
  • Sam Supakkul;Tom Hill;Lawrence Chung;Ebenezer Akin Oladimeji

  • Affiliations:
  • The Univ. of Texas at Dallas;HP Enterprise Services HP;The Univ. of Texas at Dallas;Architecture and eServices Verizon Communications

  • Venue:
  • Proceedings of the 16th Conference on Pattern Languages of Programs
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Most attacks on computer and software systems are caused by threats to known vulnerabilities. Part of the reason is that it is difficult to possess necessary broad and deep knowledge of security related strategic knowledge to choose mitigating solutions suitable for a specific application or organization. This paper presents three patterns that use goal-oriented concepts to capture knowledge of security problems and their corresponding mitigating solutions. Each pattern captures three kinds of problems, including undesirable outcome that negatively affects a security goal, threat that could lead to an undesirable outcome, and vulnerability that could be exploited by a threat. Alternative mitigating solutions are captured in relation to the problems, including vulnerability risk transfer, threat prevention, threat containment, undesirable outcome recovery, and undesirable outcome impact prevention and control. The alternatives are identified with consequences against other non-functional requirements (NFRs) such as cost and usability, which are then used as selection criteria in associated selection patterns. The patterns illustrate how knowledge of security incidents and security standards may be captured and used to help avoid the security problems suffered by TJX in one of the largest credit card theft incident in history.