Security requirements prioritization based on threat modeling and valuation graph

11Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Information systems manage assets that are critical for the business processes of organizations. Therefore, it is imperative that information systems be guaranteed and secured from the beginning of their development life cycle. Several approaches such as misuse cases, attack tree, and threat modeling have been proposed by way of security requirements. However, these approaches do not prioritize security requirements, though it is necessary in many cases. For example, when the security budget is insufficient, security requirements need to be prioritized to decide what will be developed and what will not. In this paper, we propose an extension to threat modeling by creating a process that allows the prioritization of security requirements via the valuation of assets, threats, and countermeasures modeled in a tree-like structured graph that we refer to as a "valuation graph". © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Park, K. Y., Yoo, S. G., & Kim, J. (2011). Security requirements prioritization based on threat modeling and valuation graph. In Communications in Computer and Information Science (Vol. 206 CCIS, pp. 142–152). https://doi.org/10.1007/978-3-642-24106-2_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free