Quick Search:

MAR(S)2: Methodology to articulate the requirements for security In SCADA

Dey, Somdip ORCID: https://orcid.org/0000-0001-6161-4637, Gopal, Tanaya, Subbaraju, Madhuri and Joshi, Rashmi vivek (2014) MAR(S)2: Methodology to articulate the requirements for security In SCADA. In: Fourth edition of the International Conference on the Innovative Computing Technology (INTECH 2014). IEEE

Full text not available from this repository.


Security requirement is an important aspect of system's development. There are numerous security requirements methodologies, which have been developed till date. Research is still going on to improve or create new methodologies that will make a system as secure as possible. Asset management, risk assessment, validation of functional and non-functional security requirements and security requirements elicitation are some of the important part of a security requirements methodology. However most of the security requirements methodologies in use today such as SQUARE, UMLSec, Secure Tropos and CORAS fail to perform one or more of these functions. Additionally, very few methodologies focus on critical infrastructure industrial systems like SCADA. This paper introduces a methodology (MAR(S)2) that incorporates all the important functions, which will produce a strong methodology that produces a profound and well-defined security requirements for SCADA systems.

Item Type: Book Section
Status: Published
DOI: https://doi.org/10.1109/intech.2014.6927744
School/Department: London Campus
URI: https://ray.yorksj.ac.uk/id/eprint/8604

University Staff: Request a correction | RaY Editors: Update this record