Applying problem-structuring methods to problems in computer security

  • Authors:
  • Peter Gutmann

  • Affiliations:
  • University of Auckland, Auckland, New Zealand

  • Venue:
  • Proceedings of the 2011 workshop on New security paradigms workshop
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Solutions to security problems, particularly ones involving cryptography, have typically been approached through the Inside-Out Threat Model, "this is our solution and whatever it addresses is the threat". Email encryption/signing and SSL/TLS are two examples of the Inside-Out Threat Model, with the existence of a multi-billion dollar global cybercrime industry testifying to the fact that the threat-modelling performed during the design process was aimed more at satisfying the cryptographers' rather than the end users' needs. This paper looks at the application of problem-structuring methods or PSMs, a technique from the field of social planning, to address computer security problems, not so much to define technical solutions but to help analyse the problem so that the most appropriate, rather than simply the most technologically trendy, solution is applied to the problem.