Supporting risk assessment with the systematic identification, merging, and validation of security goals

2Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Assessing security-related risks in software or systems engineering is a challenging task: often, a heterogeneous set of distributed stakeholders creates a complex system of (software) components which are highly connected to each other, consumer electronics, or Internet-based services. Changes during development are frequent and must be evaluated and handled efficiently. Consequently, risk assessment itself becomes a complex task and its results must be comprehensible by all actors in the distributed environment. Especially, systematic and repeatable identification of security goals based on a model of the system under development (SUD) is not well-supported in established methods. Thus, we demonstrate how the systematic identification, merging, and validation of security goals based on a model of the SUD in a concrete implementation of our method Modular Risk Assessment (MoRA) supports security engineers to handle this challenge.

Cite

CITATION STYLE

APA

Angermeier, D., Nieding, A., & Eichler, J. (2017). Supporting risk assessment with the systematic identification, merging, and validation of security goals. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10224 LNCS, pp. 82–95). Springer Verlag. https://doi.org/10.1007/978-3-319-57858-3_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free