{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T04:27:33Z","timestamp":1688963253495},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,4,30]],"date-time":"2020-04-30T00:00:00Z","timestamp":1588204800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,4,30]],"date-time":"2020-04-30T00:00:00Z","timestamp":1588204800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,8]]},"abstract":"Abstract<\/jats:title>Digital systems are almost always vulnerable, yet we increasingly depend on these systems. There will be many threats towards these system. In a fully networked system, the vulnerabilities will literally be exposed to the whole world. The exposed vulnerabilities may be transformed into attacks. To counter this state of \u201cvulnerability\u201d, the standard remedy is to conduct security requirements analysis and security threat modeling. Threats are assessed, and various countermeasures are devised. The totality of these measures may be described as a security architecture. The goal of a security architecture will largely be to make the system robust and resilient in the face of an adversary. However, we shall argue that this is not enough. Security architecture designs should go one step further, and actually improve the defenses when faced with hostile actions. That is, the security architectures must become antifragile.<\/jats:p>","DOI":"10.1007\/s11277-020-07310-5","type":"journal-article","created":{"date-parts":[[2020,4,30]],"date-time":"2020-04-30T17:04:31Z","timestamp":1588266271000},"page":"1615-1639","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Philosophy of Security Architecture Design"],"prefix":"10.1007","volume":"113","author":[{"given":"Geir M.","family":"K\u00f8ien","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,30]]},"reference":[{"key":"7310_CR1","volume-title":"Fooled by randomness: The hidden role of chance in life and in the markets","author":"NN Taleb","year":"2001","unstructured":"Taleb, N. N. (2001). Fooled by randomness: The hidden role of chance in life and in the markets. New York: Random House Publishing Group."},{"key":"7310_CR2","volume-title":"The black swan: The impact of the highly improbable","author":"NN Taleb","year":"2007","unstructured":"Taleb, N. N. (2007). The black swan: The impact of the highly improbable. New York: Random House Publishing Group."},{"key":"7310_CR3","volume-title":"The bed of procrustes: Philosophical and practical aphorisms","author":"NN Taleb","year":"2010","unstructured":"Taleb, N. N. (2010). The bed of procrustes: Philosophical and practical aphorisms. New York: Random House."},{"key":"7310_CR4","volume-title":"Antifragile: Things that gain from disorder","author":"NN Taleb","year":"2012","unstructured":"Taleb, N. N. (2012). Antifragile: Things that gain from disorder. New York: Random House Incorporated."},{"key":"7310_CR5","volume-title":"Skin in the game: Hidden asymmetries in daily life","author":"NN Taleb","year":"2018","unstructured":"Taleb, N. N. (2018). Skin in the game: Hidden asymmetries in daily life. New York: Random House."},{"key":"7310_CR6","volume-title":"Threat modeling: Designing for security","author":"A Shostack","year":"2014","unstructured":"Shostack, A. (2014). Threat modeling: Designing for security (1st ed.). Hoboken: Wiley Publishing.","edition":"1"},{"issue":"4","key":"7310_CR7","first-page":"2","volume":"84","author":"DC Eikmeier","year":"2004","unstructured":"Eikmeier, D. C. (2004). Center of gravity analysis. Military Review, 84(4), 2\u20135.","journal-title":"Military Review"},{"key":"7310_CR8","unstructured":"Stevens, R., Votipka, D., Redmiles, E.\u00a0M., Ahern, C., Sweeney, P., & Mazurek, M.\u00a0L. (2018). The battle for New York: A case study of applied digital threat modeling at the enterprise level. In 27th {USENIX} Security Symposium ({USENIX} Security 18) (pp. 621\u2013637)."},{"key":"7310_CR9","unstructured":"von Clausewitz, C. (2009). On war. Wildside Press."},{"key":"7310_CR10","volume-title":"The design of design: Essays from a computer scientist","author":"FP Brooks Jr","year":"2010","unstructured":"Brooks, F. P, Jr. (2010). The design of design: Essays from a computer scientist. London: Pearson Education."},{"key":"7310_CR11","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9809.001.0001","volume-title":"Great principles of computing","author":"PJ Denning","year":"2015","unstructured":"Denning, P. J., & Martell, C. H. (2015). Great principles of computing. Cambridge: MIT Press."},{"key":"7310_CR12","volume-title":"Principles of computer system design: An introduction","author":"JH Saltzer","year":"2009","unstructured":"Saltzer, J. H., & Kaashoek, M. F. (2009). Principles of computer system design: An introduction. Los Altos: Morgan Kaufmann."},{"key":"7310_CR13","doi-asserted-by":"crossref","unstructured":"Buinevich, M., Fabrikantov, P., Stolyarova, E., Izrailov, K., & Vladyko, A. (2017). Software defined internet of things: Cyber antifragility and vulnerability forecast. In 2017 IEEE 11th international conference on application of information and communication technologies (AICT) (pp. 1\u20135). IEEE.","DOI":"10.1109\/ICAICT.2017.8687021"},{"key":"7310_CR14","doi-asserted-by":"crossref","unstructured":"Monperrus, M. (2017). Principles of antifragile software. In Companion to the first international conference on the art, science and engineering of programming (p. 32). ACM.","DOI":"10.1145\/3079368.3079412"},{"key":"7310_CR15","doi-asserted-by":"crossref","unstructured":"K\u00f8ien, G.\u00a0M. (2014). A best current practice for 3GPP-based cellular system security. In Proceedings of global wireless summit 2014 (GWS\u201914). GWS.","DOI":"10.1109\/VITAE.2014.6934443"},{"issue":"1 & 2","key":"7310_CR16","first-page":"60","volume":"8","author":"GM K\u00f8ien","year":"2015","unstructured":"K\u00f8ien, G.\u00a0M. (2015). Reflections on evolving large-scale security architectures. International Journal on Advances in Security Volume, 8(1 & 2), 60\u201378.","journal-title":"International Journal on Advances in Security"},{"issue":"9","key":"7310_CR17","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"JH Saltzer","year":"1975","unstructured":"Saltzer, J. H., & Schroeder, M. D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9), 1278\u20131308.","journal-title":"Proceedings of the IEEE"},{"key":"7310_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30070-2","volume-title":"Anti-fragile ICT systems","author":"JK Hole","year":"2016","unstructured":"Hole, J. K. (2016). Anti-fragile ICT systems. Berlin: Springer-Verlag GmbH."},{"issue":"1","key":"7310_CR19","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/32.481513","volume":"22","author":"M Abadi","year":"1996","unstructured":"Abadi, M., & Needham, R. (1996). Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1), 6\u201315.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"7310_CR20","volume-title":"Through the looking glass: And what Alice found there","author":"L Carroll","year":"1917","unstructured":"Carroll, L. (1917). Through the looking glass: And what Alice found there. Chicago: Rand McNally."},{"key":"7310_CR21","unstructured":"Schneier, B. (2009). Beyond security theater. https:\/\/www.schneier.com\/blog\/archives\/2009\/11\/beyond_security.html."},{"key":"7310_CR22","volume-title":"The folly of fools: The logic of deceit and self-deception in human life","author":"R Trivers","year":"2011","unstructured":"Trivers, R. (2011). The folly of fools: The logic of deceit and self-deception in human life. New York: Basic Books."},{"key":"7310_CR23","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/978-1-4939-6457-4_2","volume-title":"Understanding social engineering based scams","author":"D McCoy","year":"2016","unstructured":"McCoy, D., Park, Y., Shi, E., & Jakobsson, M. (2016). Identifying scams and trends. In M. Jakobsson (Ed.), Understanding social engineering based scams (pp. 7\u201319). Berlin: Springer."},{"issue":"2","key":"7310_CR24","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1108\/JFC-06-2018-0053","volume":"26","author":"MT Whitty","year":"2019","unstructured":"Whitty, M. T. (2019). Who can spot an online romance scam? Journal of Financial Crime, 26(2), 623\u2013633.","journal-title":"Journal of Financial Crime"},{"key":"7310_CR25","unstructured":"Slocombe, R. (2014). British Posters of the second world war. Imperial War Museums."},{"issue":"2","key":"7310_CR26","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","volume":"20","author":"EN Lorenz","year":"1963","unstructured":"Lorenz, E. N. (1963). Deterministic nonperiodic flow. Journal of the Atmospheric Sciences, 20(2), 130\u2013141.","journal-title":"Journal of the Atmospheric Sciences"},{"key":"7310_CR27","volume-title":"Normal accidents","author":"C Perrow","year":"1999","unstructured":"Perrow, C. (1999). Normal accidents. Princeton: Princeton University Press."},{"key":"7310_CR28","unstructured":"Taleb, N.\u00a0N., Bar-Yam, Y., Douady, R., Norman, J., & Read, R. (2014a). The precautionary principle: Fragility and black swans from policy actions. Extreme Risk Initiative\u2013NYU School of Engineering Working Paper Series."},{"key":"7310_CR29","unstructured":"Taleb, N.\u00a0N., Read, R., Douady, R., Norman, J., & Bar-Yam, Y. (2014b). The precautionary principle (with application to the genetic modification of organisms). arXiv preprint arXiv:1410.5787."},{"issue":"1","key":"7310_CR30","first-page":"80","volume":"1","author":"EM Hutchins","year":"2011","unstructured":"Hutchins, E. M., Cloppert, M. J., & Amin, R. M. (2011). Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research, 1(1), 80.","journal-title":"Leading Issues in Information Warfare & Security Research"},{"key":"7310_CR31","unstructured":"Pols, P. (2017). The unified kill chain: Designing a unified kill chain for analyzing, comparing and defending against cyber attacks. Ph.D. thesis, Cyber Security Academy (CSA)."},{"key":"7310_CR32","unstructured":"Strom, B.\u00a0E., Applebaum, A., Miller, D.\u00a0P., Nickels, K.\u00a0C., Pennington, A.\u00a0G., & Thomas, C.\u00a0B. (2018). MITRE ATT&CK: Design and philosophy. MITRE Product MP 18\u20130944."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07310-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07310-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07310-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T00:17:44Z","timestamp":1619741864000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07310-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,30]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["7310"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07310-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,30]]},"assertion":[{"value":"30 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}