Security Risk Assessments: Modeling and Risk Level Propagation

Author:

Angermeier Daniel1ORCID,Wester Hannah1ORCID,Beilke Kristian1ORCID,Hansch Gerhard1ORCID,Eichler Jörn2ORCID

Affiliation:

1. Fraunhofer-Institute AISEC, Garching, Bavaria, Germany

2. Freie Universität Berlin, Institute of Computer Science, Berlin, Germany

Abstract

Security risk assessment is an important task in systems engineering. It is used to derive security requirements for a secure system design and to evaluate design alternatives as well as vulnerabilities. Security risk assessment is also a complex and interdisciplinary task, where experts from the application domain and the security domain have to collaborate and understand each other. Automated and tool-supported approaches are desired to help manage the complexity. However, the models used for system engineering usually focus on functional behavior and lack security-related aspects. Therefore, we present our modeling approach that alleviates communication between the involved experts and features steps of computer-aided modeling to achieve consistency and avoid omission errors. We demonstrate our approach with an example. We also describe how to model impact rating and attack feasibility estimation in a modular fashion, along with the propagation and aggregation of these estimations through the model. As a result, experts can make local decisions or changes in the model, which in turn provides the impact of these decisions or changes on the overall risk profile. Finally, we discuss the advantages of our model-based method.

Publisher

Association for Computing Machinery (ACM)

Subject

Artificial Intelligence,Control and Optimization,Computer Networks and Communications,Hardware and Architecture,Human-Computer Interaction

Reference37 articles.

1. Daniel Angermeier, Alexander Nieding, and Jörn Eichler. 2016. Supporting risk assessment with the systematic identification, merging, and validation of security goals. In International Workshop on Risk Assessment and Risk-driven Testing. Springer, Cham, Germany, 82–95.

2. Systematic identification of security goals and threats in risk assessment;Angermeier Daniel;Softwaretechnik-Trends,2016

3. Supporting Risk Assessment with the Systematic Identification, Merging, and Validation of Security Goals

4. Robustness in the Strategy of Scientific Model Building

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3