User-Centered Information Security Policy Development in a Post-Stuxnet World

  • Authors:
  • Shamal Faily;Ivan Flechais

  • Affiliations:
  • -;-

  • Venue:
  • ARES '11 Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

A balanced approach is needed for developing information security policies in Critical National Infrastructure (CNI) contexts. Requirements Engineering methods can facilitate such an approach, but these tend to focus on either security at the expense of usability, or vice-versa, it is also uncertain whether existing techniques are useful when the time available for applying them is limited. In this paper, we describe a case study where Usability and Requirements Engineering techniques were used to derive missing requirements for an information security policy for a UK water company following reports of the Stuxnet worm. We motivate and describe the approach taken while carrying out this case study, and conclude with three lessons informing future efforts to integrate Security, Usability, and Requirements Engineering techniques for secure system design.