
zones,  which  help  to  understand  allowed  and 
forbidden  information  flows  within  and  between 
these zones. We call the resulting model a DFDsec. 
The  model  enables  a  threat  analysis  on 
interconnections,  especially  between  the  identified 
security  zones,  in  order  to  determine  operational 
nodes which  are  most endangered by  the  threat of 
losing  confidentiality,  availability  or  integrity.  We 
discussed  an  initial  approach  for  quantifying  the 
security importance of all nodes, based on the given 
DFDsec structure. This helps to rank and prioritize 
operational nodes in their importance for necessary 
security  improvements  and  mitigation efforts.  This 
approach can be used already in the early phase of 
the development phase which helps reducing costs.  
The  DFDsec  methodology  is work  in  progress. 
Future  work  will  focus  on  the  further  analysis  of 
structural properties in the data flow representation. 
We  also  aim  for  a  quantitative  analysis  approach, 
where data flow edges are parametrized with attack 
potentials. This would allow  an  even  more precise 
identification  of  vulnerable  operational  nodes. 
Another  future  topic  is  the  application  of  the 
methodology  in  a  practical  context,  such  as  the 
German armed forces IT infrastructure.  
REFERENCES 
Bell,  D.  E.,  LaPadula,  L.  J.,  1976.  Secure  computer 
system: Unified Exposition and Multics Interpretation, 
Technical  Report  ESD-TR-75-306,  MITRE  Corp. 
MTR-2997, Bedford, MA.  
Biba,  K.  J.,  1976.  Integrity  considerations  for  secure 
computer systems, Technical Report ESD-TR-76-372, 
MITRE Corp. MTR-3153, Bedford, MA.  
Cisco, 2016. Cisco 2016 Annual Security Report. 
Cyberedge  Group,  2015.  2015  Cyberthreat  Defense 
Report. 
DeMarco,  1978.  T.  Structured  Analysis  and  System 
Specification, Yourdon Press, New York, NY. 
Denning,  D.  E.,  1976.  A  lattice  model  of  secure 
information  flow,  Communications  of  the  ACM, 
19(5):236-243. 
Denning, D. E. and Denning, P. J., 1977. Certification of 
programs  for  secure  information  flow, 
Communications of the ACM, 20(7):504-513. 
Eckstein,C., 2015. Preventing data leakage: A risk based 
approach  for  controlled  use  of  the  use  of 
administrative  and  access  privileges,  White  Paper, 
SANS Institute. 
ENISA, 2017. ENISA Threat Landscape Report 2016. 
European  Parliament,  Directorate  General  for  Internal 
Policies,  Police  Department  A:  Economic  and 
Scientific  Policy,  2013. Data  and  Security  Breaches 
and  Cyber-Security  Strategies  in  the  EU  and  its 
International Counterparts. 
Federal  Office  for  Information  Security  (BSI),  2008. 
Information  Security  Management  Systems  (ISMS), 
BSI-Standard 100-1, Version 1.5. 
Gane,  C.  and  Sarson,  T.  1977.  Structured  Systems 
Analysis  and  Design,  Improved  Systems 
Technologies, Inc., New York, NY. 
Gemalto, 2016. Breach Level Index. 
Genua  gmbh,  2016.  Datendiode  vs-diode,  Munich, 
Germany: www.genua.de, Web-Access 06. April. 
Gordon, P. 2007. Data Leakage Threats and Mitigation, 
White Paper, SANS Institute. 
Harrison, W. S., Hanebutte, N., Oman, P. W. and Alves-
Foss,  J.,  2005.  The  MILS  Architecture  for  a  Secure 
Global  Information  Grid,  The  Journal  of  Defense 
Software Engineering, pages 20-24. 
HM  Government,  2015.  2015  Information  Security 
Breaches Survey. 
Identity Theft Resource Center, 2015. 2015 Data Breach 
Stats. 
Infodas,  2016.  SDoT  ®  Security Gateway  5.0,  Cologne, 
Germany: www.infodas.de, Web-Access 06. April. 
Infowatch, 2016. Global Data Leakage Report, H1 2016. 
International Organization for Standardization, 2013. ISO 
27001 Information technology - Security techniques - 
Information  security  management  systems  Overview 
and vocabulary, GE, SUI. 
Mah,  P.  2017. 7  Social Engineering Scams  and  How  to 
Avoid Them, www.cio.com, Web-Access 09. June. 
Myers, A. C. and Liskov, B., 1997. A decentralized model 
for information flow control, In SOSP 97: Proceedings 
of  the  sixteenth  ACM  symposium  on  Operating 
systems principles, pages 129142. ACM Press. 
Ponemon  Institute,  2016.  2016  Cost  of  Data  Breach 
Study: Global Analysis. 
Rodgers,  C.  2017.  Data  Classification:  Why  is  it 
important  for  Information  Security?,  SecureState 
Blog: www.securestate.com, Web-Access 05. July.  
Rushby,  J.  1981.  Design  and  Verification  of  Secure 
Systems,  ACM  Operating  Systems  Review  Vol.  15 
No. 5 pages 12-21. ACM Press. 
Schmidt, K., Tröger, P., Kroll, H., Bünger, T. et al., 2014. 
Adapted  Development  Process  for  Security  in 
Networked Automotive Systems, SAE Int. J. Passeng. 
Cars  Electron.  Electr.  Syst.  7(2):516-526, 
doi:10.4271/2014-01-0334. 
Shostack,  A.,  2008.  Experiences  Threat  Modeling  at 
Microsoft,  In  Workshop  on  Modeling  Security, 
Toulouse. 
Torr, P. 2005. Demystifying the Threat-Modeling Process, 
IEEE Security & Privacy Magazine, vol. 3, no. 5, pp. 
66-70. 
TrendLabs 
SM
 APT Research Team, 2012. Spear-Phishing 
E-Mail:  die  beliebteste  APT-Angriffstechnik},  Trend 
Micro, Hallbergmoos, Germany. 
Trustwave, 2015, 2015 Trustwave Global Security Report. 
Verisign,  2016.  Verisign  Distributed  Denial  of  Service 
Trends Report, Volume 3, Issue 3. 
Verizon, 2016. 2016 Data Breach Investigations Report. 
Yourdon, E. 1989. Modern Structured Analysis, Yourdon 
Press, Upper Saddle River, NJ. 
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
250