@book{d3d4654abed3442ba5ba68b7ecd98f4a,
title = "Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain",
abstract = "The security goals of an organization are implemented through security policies, which concern physical security, digital security and security awareness. An insider is aware of these security policies, and might be able to thwart the security goals without violating any policies, by combining physical, digital and social means. This paper presents the Portunes model, a model for describing and analyzing attack scenarios across the three security areas. Portunes formally describes security alignment of an organization and finds attack scenarios by analyzing inconsistencies between policies from the different security areas. For this purpose, the paper defines a language in the tradition of the Klaim family of languages, and uses graph-based algorithms to find attack scenarios that can be described using the defined language.",
keywords = "EWI-15308, SCS-Cybersecurity, physical security, METIS-263827, Insider Threat, IR-65473, security awareness, security model",
author = "T. Dimkov and Wolter Pieters and Hartel, {Pieter H.}",
year = "2009",
month = apr,
day = "24",
language = "Undefined",
series = "CTIT Technical Report Series",
publisher = "Centre for Telematics and Information Technology (CTIT)",
number = "TR-CTIT-09-15",
address = "Netherlands",
}