SAM9773
SAM9773
Thomas A. Fuhrman
Senior Vice President, Booz Allen Hamilton, Herndon, VA, USA
Systems
Engineering
Interdisciplinary
by
design
Program
integration
and
management
tools
International
Council
on
Systems
Engineering
(INCOSE)
Use
Case
Analysis
develops
and
disseminates
best
practices
for
Design
Trade-‐off
Analysis
(Figures
of
successful
systems.
Merit/Evaluation
Measures)
Publishes
the
Systems
Engineering
Handbook
and
Life
Cycle
management
tools
maintains
the
Systems
Engineering
Body
of
Knowledge
Certification
programs
[14]
Reliability
Engineering
Emerged
in
the
1950s
Statistical
modeling
Relationship
to
Surety
Engineering
and
NASA
Mission
Reliability
Physics
(Physics
of
Failure)
Assurance
[15]
Failure
Modes
and
Effects
Analysis
Industry-‐recognized
Certified
Reliability
Engineer
(CRE)
Fault
Tree
Analysis
and
Certified
Reliability
Professional
certifications
through
American
Society
for
Quality
(ASQ)
[16]
IEEE
Reliability
Society
provides
numerous
professional
development
opportunities
[17]
System
Safety
Engineering
International
System
Safety
Society
fosters
the
Qualitative
Analysis
to
anticipate
failure
application
of
systems
engineering
and
systems
potential
during
the
design
phase
management
to
the
process
of
hazard,
safety,
and
risk
Hazard,
Safety,
and
Risk
analyses
(qualitative
analysis
[18]
and
quantitative)
Certification
programs
Designing
ways
to
contain
failures
Safety
of
software
as
a
special
area
of
focus
Cyber
Security
Engineering
Major
industry-‐recognized
certifications
through
Mis-‐Use
Case
Analysis
(ISC)2,
SANS,
ISACA,
and
other
organizations
Threat
Identification
and
Characterization
System
Security
Engineering
Capability
Maturity
Model
Risk
Management
Framework
and
controls
(ISO/IEC
21827:2008)
model
for
organizations
[13]
catalog
Continuous
management
of
system
security
throughout
the
life
cycle
a structured way of thinking about how the system will be diagrams as well, ultimately leading to additional system
used in its operating environment that helps in defining the requirements. [20, 21]
functional requirements.
Both analyses—use case and mis-use case—can help
In practice, use cases are usually expressed using the with the trade studies through which the design evolves in
Unified Modeling Language (UML) that depicts both the addition to their role in requirements definition.
actors and the process flow, facilitating information exchange
and enabling the use of automated support tools. However, it An example of the use case and mis-use case operational
can be helpful to begin by developing a top-level conceptual views is shown in Figures 5 and 6. These figures depict a
picture similar to the “operational view” of the Department of notional case in the Air Traffic Management System: the pre-
Defense Architecture Framework (DODAF). This can then takeoff preparation of the aircraft, filing of the flight plan, and
provide a structured way of thinking about the problem to the ground operations associated with starting the engines and
illuminate needs, enable creative cross-disciplinary taxiing. Coordination with the air traffic management
discussion, and produce insights into the cyber security and facilities of the Federal Aviation Administration (FAA) is a
other non-functional requirements. It can be a pre-cursor to necessity, as are programming the onboard navigation
the UML Use Case Diagrams. computer, getting authorization from the airline operations
center, and obtaining taxi clearance from the control tower.
Figure 5. Operational View of a Pre-Takeoff Use Case (Air Traffic Management)
A tool that is particularly suited to the cyber security These process steps are accomplished by people at a wide
engineering challenge is “mis-use case” analysis. Initially range of locations and facilities.2 The operational view of the
developed in the 1990s, the mis-use case turns the use case
2
around by focusing on what a malicious actor could do to This scenario is for illustration only. In reality, most of the
disrupt, subvert, or negate the performance of the system. The requirements of today’s Air Traffic Management System are already
top-level operational view can also be used for the mis-use known and specified by standards and regulatory requirements of the
FAA and other agencies. Nonetheless, specific implementation
case. These insights can later be developed into UML details would typically still need to be decided as part of the system
engineering effort, and a regular review of mis-use cases is advisable
as threats change.
use case and its associated misuse case allow all members of 5 Summary and Prescription
the systems engineering team to work together from a
common starting point. Although the intellectual groundwork for cyber security
engineering for mission systems is solidly in place, the degree
Examination of the mis-use case should involve every of true engagement by cyber security engineers still falls short
component and link within the system, and every relevant of what it should be. Evidence indicates that acquiring
threat vector with the goal of illuminating the cyber security organizations do not have a clear picture of the value
challenges. These results should be brought forward for proposition of the cyber security engineer, and, frankly, there
further consideration and analysis. are not enough qualified cyber security engineers to meet the
needs even if the value proposition were recognized. If cyber
In the example shown in Figure 6, possible cyber security specialists are to have an impact on mission systems,
challenges suggested by the operational view include they must have the skills to engage in the system engineering
interception of mission data by intruding into the process as franchised members, not as dabblers. This will be
communication links in the system; exploitation of the insider difficult to achieve as the cyber community is already
leading to compromise of access controls or other critical struggling to develop the workforce to address the more
security controls; penetration of the ground-based networks obvious needs of securing networks and IT systems.
that communicate and process critical system data; and
Figure 6. Operational View of a Pre-Takeoff Mis-Use Case (Air Traffic Management)
malicious exploitation of vulnerabilities in the supply chain of More emphasis is therefore needed on the specific
the avionics equipment. These insights are just the start of the challenge of cyber security engineering for mission systems
process, and a full use/mis-use case analysis using accepted through existing university programs, U.S. government cyber
systems engineering tools should be the next step. scholarship initiatives, and professional certification
programs.
Cyber security specialists themselves need to be part of [7] Peter Neumann. Moderator, Risks Digest,
the solution. They should strive to learn the practices of http://catless.ncl.ac.uk/Risks.
systems engineering, encourage their organizations to
embrace SSE-CMM, and work hard at their own professional [8] Robert McMillan. “Virus targeted at Siemens industrial
development. They should learn and internalize the unique control systems”, IDG News Service, July 17, 2010.
value that the cyber security engineering community can http://www.networkworld.com/news/2010/071710-new-
bring to the systems engineering arena. And they should gain virus-targets-industrial.html.
experience in the use of systems engineering tools.
[9] Brent Kesler. “The Vulnerability of Nuclear Facilities to
Lastly, the similarities and strong overlaps among Cyber Cyber Attack,” Strategic Insights, Vol. 10, Issue 1, pp. 15 –
Security Engineering, System Safety Engineering, and 25, Spring 2011.
Reliability Engineering should prompt those professional
communities to work together in an effort to find greater [10] DoD Directive 8581.1. “Information Assurance (IA)
synergy in the systems engineering environment. The Policy for Space Systems Used by the Department of
professional societies and associations that represent these Defense,” June 21, 2005.
stakeholders should join together under the auspices of the
International Council on Systems Engineering (INCOSE) to [11] The Smart Grid Interoperability Panel – Cyber Security
tackle this together to enhance the profession and produce Working Group. Guidelines for Smart Grid Cyber Security,
mission systems with better performance in any NISTIR 7628, August 2010.
environment—normal, abnormal, or hostile.
[12] NIST Special Publication 800-53 Revision 3.
“Recommended Security Controls for Federal Information
6 References Systems and Organizations,” National Institute of Standards
[1] Cyber IN-security: Strengthening the Federal Cyber and Technology, Gaithersburg, MD.
security Workforce; Partnership for Public Service and Booz
Allen Hamilton, July 2009. [13] ISO/IEC 21827:2008. Systems Security Engineering—
Capability Maturity Model®.
[2] Brian Dutcher. “Determining the Role of the
IA/Security Engineer,” SANS Institute; InfoSec Reading [14] International Council on Systems Engineering
Room. March 15, 2010, (INCOSE). http://www.incose.org
http://www.sans.org/reading_room/whitepapers/assurance/det
ermining-role-ia-security-engineer_33508. [15] NASA Office of Safety and Mission Assurance.
http://www.hq.nasa.gov/office/codeq/.
[3] Robert Ayoub. The 2011 (ISC)2 Global Information
Security Workforce Study, Frost & Sullivan Market Survey [16] American Society for Quality. Certified Reliability
Sponsored by (ISC)2, 2011. Engineer,
http://prdweb.asq.org/certification/control/reliability-
[4] Karen Evans and Franklin Reeder. “Human Capital engineer/index.
Crisis in Cybersecurity Technical Proficiency Matters,” A
Report of the CSIS Commission on Cybersecurity for the [17] IEEE Reliability Society. http://rs.ieee.org/.
44th Presidency, Center for Strategic and International
Studies, November 2010. [18] The International System Safety Society.
http://www.system-safety.org/.
[5] Eric Beidel and Stew Magnuson. “Government, Military
Face Severe Shortage Of Cybersecurity Experts”, National [19] Nancy Leveson. “White Paper on Approaches to Safety
Defense (National Defense Industrial Association), August Engineering.” Nancy Leveson’s Home Page at MIT, April 23,
2011, 2003; http://sunnyday.mit.edu/caib/concepts.pdf.
http://www.nationaldefensemagazine.org/archive/2011/Augus
t/Pages/Government,MilitaryFaceSevereShortageOfCybersec [20] Guttorm Sindre and Andreas Opdahl. Eliciting Security
urityExperts.aspx. Requirements by Misuse Cases, Proceedings of TOOLS
Pacific 2000, pp. 120-131, 20-23 November 2000, IEEE
[6] Norbert Wiener. Cybernetics: or Control and Computer Society Press.
Communication in the Animal and the Machine, The
Massachusetts Institute of Technology, Cambridge, MA, [21] Ian Alexander. “Use/Misuse Case Analysis Elicits Non-
1948 and 1961. Functional Requirements,” Computing & Control
Engineering Journal, Volume 14, Issue 1, pp. 40 – 45, Feb.
2003.