Affiliation:
1. SINTEF ICT, Norway
2. University of Trento, Italy
3. Critical Embedded Systems Laboratory, Thales Research and Technology, France
4. Buys Ballot Laboratory, Utrecht University, The Netherlands
Abstract
Goal and threat modelling are important activities of security requirements engineering: goals express why a system is needed, while threats motivate the need for security. Unfortunately, existing approaches mostly consider goals and threats separately, and thus neglect the mutual influence between them. In this paper, the authors address this deficiency by proposing an approach that extends goal modelling with threat modelling and analysis. The authors show that this effort is not trivial and a trade-off between visual expressiveness, usability and usefulness has to be considered. Specifically, the authors integrate threat modelling with the socio-technical security modelling language (STS-ml), introduce automated analysis techniques that propagate threats in the combined models, and present tool support that enables reuse of threats facilitated by a threat repository. The authors illustrate their approach on a case study from the Air Traffic Management (ATM) domain, from which they extract some practical challenges. The authors conclude that threats provide a useful foundation and justification for the security requirements that the authors derive from goal modelling, but this should not be considered as a replacement to risk assessment. The usage of goals and threats early in the development process allows raising awareness of high-level security issues that occur regardless of the chosen technology and organizational processes.
Reference43 articles.
1. Aniketos. (2013). Deliverable 1.4 Final version of the socio-technical security modelling language tool. Retrieved from http://www.aniketos.eu/content/deliverables
2. Goal-driven risk assessment in requirements engineering
3. A Requirements-Driven Development Methodology
4. On non-functional requirements in software engineering;L.Chung;Conceptual modeling: Foundations and applications,2009
5. Committee on National Security Systems (CNSS). (2010). National, information assurance (IA) glossary, Instruction No. 4009. Retrieved from http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献