Using simulation to engineer cybersecurity requirements

James Nutaro, Glenn Allgood, Teja Kuruganti, Darren Highfill

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

When large software projects fail, it is often because of inappropriate, misunderstood, or poorly conceived requirements. When a project is successful, the cost of building the system can be exceeded by the cost of correcting problems discovered after delivery. This is particularly true of cybersecurity problems, which are typically discovered after a system has been put into operation. By addressing cybersecurity in a system's requirements - at the beginning of the system lifecycle - the total cost of the system can be substantially reduced. In this paper, we discuss the role that modeling and simulation may play in the construction of appropriate and clearly articulated requirements for cybersecurity in complex software systems.

Original languageEnglish
Title of host publication8th Annual Cyber Security and Information Intelligence Research Workshop
Subtitle of host publicationFederal Cyber Security R and D Program Thrusts, CSIIRW 2013
DOIs
StatePublished - 2013
Event8th Annual Cyber Security and Information Intelligence Research Workshop: Federal Cyber Security R and D Program Thrusts, CSIIRW 2013 - Oak Ridge, TN, United States
Duration: Jan 8 2013Jan 10 2013

Publication series

NameACM International Conference Proceeding Series

Conference

Conference8th Annual Cyber Security and Information Intelligence Research Workshop: Federal Cyber Security R and D Program Thrusts, CSIIRW 2013
Country/TerritoryUnited States
CityOak Ridge, TN
Period01/8/1301/10/13

Fingerprint

Dive into the research topics of 'Using simulation to engineer cybersecurity requirements'. Together they form a unique fingerprint.

Cite this