{"title":"关键系统和功能的系统安全工程漏洞评估","authors":"JeanPaul LeSaint, Melinda Reed, P. Popick","doi":"10.1109/SYSCON.2015.7116818","DOIUrl":null,"url":null,"abstract":"This paper describes multiple system security engineering techniques for assessing system security vulnerabilities and discusses the application of these techniques at different system maturity points. The proposed vulnerability assessment approach allows a systems engineer to identify and assess vulnerabilities early in the life cycle and to continually increase the fidelity of the vulnerability identification and assessment as the system matures.","PeriodicalId":251318,"journal":{"name":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","volume":"123 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"System security engineering vulnerability assessments for mission-critical systems and functions\",\"authors\":\"JeanPaul LeSaint, Melinda Reed, P. Popick\",\"doi\":\"10.1109/SYSCON.2015.7116818\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes multiple system security engineering techniques for assessing system security vulnerabilities and discusses the application of these techniques at different system maturity points. The proposed vulnerability assessment approach allows a systems engineer to identify and assess vulnerabilities early in the life cycle and to continually increase the fidelity of the vulnerability identification and assessment as the system matures.\",\"PeriodicalId\":251318,\"journal\":{\"name\":\"2015 Annual IEEE Systems Conference (SysCon) Proceedings\",\"volume\":\"123 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-04-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Annual IEEE Systems Conference (SysCon) Proceedings\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SYSCON.2015.7116818\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SYSCON.2015.7116818","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
System security engineering vulnerability assessments for mission-critical systems and functions
This paper describes multiple system security engineering techniques for assessing system security vulnerabilities and discusses the application of these techniques at different system maturity points. The proposed vulnerability assessment approach allows a systems engineer to identify and assess vulnerabilities early in the life cycle and to continually increase the fidelity of the vulnerability identification and assessment as the system matures.