当前位置: X-MOL 学术J. Organ. Comput. Electron. Commer. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Systems theoretic process analysis of information security: the case of aadhaar
Journal of Organizational Computing and Electronic Commerce ( IF 2.9 ) Pub Date : 2019-07-03 , DOI: 10.1080/10919392.2019.1598608
Pratik Tarafdar 1 , Indranil Bose 1
Affiliation  

ABSTRACT A new way of thinking about cybersecurity is much needed to deal with the complex and dynamic cyber-ecosystem. In this paper, we introduce a systems thinking based approach for solving problems related to cybersecurity. We adapt the powerful safety-hazard analysis method, Systems Theoretic Process Analysis (STPA) based on systems theory to analyze the cybersecurity related features of India’s massive digital identity program, Aadhaar. Our findings produce important insights. On one hand, it helps identify the security gaps of the Aadhaar system, and on the other hand, it provides controls using systems thinking to overcome these gaps. We contribute to understanding the world of cybersecurity practices and develop risk mitigation strategies that can benefit the Aadhaar.

中文翻译:

信息安全的系统理论过程分析:以aadhaar为例

摘要 处理复杂和动态的网络生态系统非常需要一种关于网络安全的新思维方式。在本文中,我们介绍了一种基于系统思维的方法来解决与网络安全相关的问题。我们采用基于系统理论的强大安全危害分析方法系统理论过程分析 (STPA) 来分析印度大规模数字身份程序 Aadhaar 的网络安全相关特征。我们的发现产生了重要的见解。一方面,它有助于识别 Aadhaar 系统的安全漏洞,另一方面,它使用系统思维提供控制来克服这些漏洞。我们致力于了解网络安全实践的世界,并制定可以使 Aadhaar 受益的风险缓解策略。
更新日期:2019-07-03
down
wechat
bug