Page 158 - Kaleidoscope Academic Conference Proceedings 2021
P. 158

2021 ITU Kaleidoscope Academic Conference




                                                                                             rd
           for which policy objective commitments-to-protecting value   is born, represented by orange. The 3  Force Influence is
           assets are made; for which security mechanisms-to-mitigate   the Preservation Force “is validated by” the Assurance Force,
           threats-to-vulnerabilities must be implemented; and tested   or conversely Assurance Force “validates” Preservation
           with the intent to collect sufficient evidentiary artifacts to   Force.
           meet assurance requirements.
                                                              A security control, in its most elemental form is a worded
                                                              statement  of “security value to-be-delivered-to  value
           The author will indicate five prior ITU publications related   creation.” It is a matter of perspective. Figure 7 illustrates the
           to the technology. Vulnerability expressions  were  not   notion that delivery of security is from the perspective of
           previously published and constitute new material.
                                                              security  operations and  receiving  protection is from the
                                                              perspective of value creation. If one assumes that “Security
           3.1   Unified security model
                                                              Delivered is not necessarily the same as Protection Received”
           It is assumed that the reader has reviewed and understood the   (Figure  7), a  simple  relationship emerges by which the
           Technical Report entitled “Unified Security Model, a neutral   deliver versus  receive value must  be validated through
           integrated system approach to cybersecurity” [2] published   testing and  verification. This fundamental assumption  of
           by  ITU-T Standardization,  Study Group  17 Security, in   inequality is the genesis of the expression model.
           2020. Additional  directly related  ITU publications  which
           include related work can be found in references [3] through
           [7]. The author is aware of similar relational thinking work
           published in  ISO/IEC 27034-5-1 Application Security
           Series Part 1-5, Application Security Control structure using
           graphs in XML schema.

           The foundation of vulnerability expressions is based on the
           Unified Security Model (USM), which is in turn founded on
           a simple  4 digital force model (Figure  6). The  USM
           represents “all matters security” by these  4  digital forces   Figure 7 – Security versus protection
           engaged in 3 force “influences” relationships, as follows:
                                                              3.2   Security control expression model
                                                              The 4 digital forces of Figure 6 are represented by 6 security
                                                              actors, each having specific roles and properties designed on
                                                              enabling the digital force (Figure 8) they represent.
                                                              The Security Control Expression (“Expression Model”) is a
                                                              high-level relationship  model of 6 actors engaged in  5
                                                              relationships,  representing  4 digital forces, described as
                                                              follows:







                      Figure 6 – 4 digital force model

           Start: When a new cybersecurity universe is born, it is empty.
           A  Value Creation Force is born, represented  by the color
           gold in the center of Figure 6. Where there is value, there will
           be risk. Consequently, a Value Risk  Force is born,
                                st
           represented by red. The 1  Force Influence is Risk Force
           “threatens” Creation Force, or conversely Creation Force “is
           threatened by” Risk Force. The owner of the Value Force
           will seek to  minimize the  loss to value  and invest in  its
           preservation.  A  new Value Preservation Force is  born,
                                 nd
           represented by blue. The 2  Force Influence is Creation     Figure 8 – Actors representing forces
           force “is protected by” the Preservation Force, or conversely
           Preservation Force “protects” Creation Force. The owner of   The  Value Creation Force is represented  by two value
           the value  who has invested  to minimize loss through the   actors: Value Process and Value Asset. Value Risk Force is
           investment of value preservation, will seek assurances of the   represented  by 1  risk actor: Threat  Vector.  Value
           efficacy of the preservation. A new Value Assurance Force   Preservation Force  is represented by 2 security  actors:
                                                              Internal Control and Security Asset.  Value Assurance




                                                           – 96 –
   153   154   155   156   157   158   159   160   161   162   163