peer reviewedWe propose an operational framework for a social, technical and contextual analysis of security. The framework provides guidelines about how to model a system as a layered set of interacting elements, and proposes two methodologies to analyse technical and social vulnerabilities. We show how to apply the framework in a use case scenario.R-AGR-0417-1 > C11/IS/1183245 : STAST > 01/05/2012 - 30/04/2015 > RYAN Pete
Soliciting and managing the protection of information assets has become a objective of paramount imp...
Identification of threats to organisations and risk assessment often take into consideration the pur...
International audienceThe increasing number of cyberattacks requires to incorporate security concern...
Abstract. We propose an operational framework for a social, technical and contextual analysis of sec...
This thesis seeks to establish a semi-automatic methodology for security analysis when users are con...
peer reviewedInspired by the root cause analysis procedures common in safety, we propose a methodolo...
Security has been a growing concern for large organizations, especially financial and gov- ernmental...
International audienceToday, most complex and large systems, such as healthcare systems, integrate t...
Many systems are hacked daily and apparently without much effort (e.g., see [1]). This happens becau...
peer reviewedRecent initiatives that evaluate the security of physical systems with objects as asset...
Inspired by the root cause analysis techniques that in the field of safety research and practice hel...
The correct management of information systems security is often over looked in technological measure...
This paper highlights methods of syntactic and semantic social engineering attacks (human-based and ...
This paper examines the role and value of information security awareness efforts in defending agains...
2015 - 2016Recent security breaches showed that every attack begins with the involvement of users an...
Soliciting and managing the protection of information assets has become a objective of paramount imp...
Identification of threats to organisations and risk assessment often take into consideration the pur...
International audienceThe increasing number of cyberattacks requires to incorporate security concern...
Abstract. We propose an operational framework for a social, technical and contextual analysis of sec...
This thesis seeks to establish a semi-automatic methodology for security analysis when users are con...
peer reviewedInspired by the root cause analysis procedures common in safety, we propose a methodolo...
Security has been a growing concern for large organizations, especially financial and gov- ernmental...
International audienceToday, most complex and large systems, such as healthcare systems, integrate t...
Many systems are hacked daily and apparently without much effort (e.g., see [1]). This happens becau...
peer reviewedRecent initiatives that evaluate the security of physical systems with objects as asset...
Inspired by the root cause analysis techniques that in the field of safety research and practice hel...
The correct management of information systems security is often over looked in technological measure...
This paper highlights methods of syntactic and semantic social engineering attacks (human-based and ...
This paper examines the role and value of information security awareness efforts in defending agains...
2015 - 2016Recent security breaches showed that every attack begins with the involvement of users an...
Soliciting and managing the protection of information assets has become a objective of paramount imp...
Identification of threats to organisations and risk assessment often take into consideration the pur...
International audienceThe increasing number of cyberattacks requires to incorporate security concern...