Til hovedinnhold
Norsk English

Threat Analysis in Goal-Oriented Security Requirements Modelling

Sammendrag

Goal and threat modelling are important activities of security requirements engineering: goals express why a system is needed, while threats motivate the need for security. Unfortunately, existing approaches mostly consider goals and threats separately, and thus neglect the mutual influence between them. In this paper, the authors address this deficiency by proposing an approach that extends goal modelling with threat modelling and analysis. The authors show that this effort is not trivial and a trade-off between visual expressiveness, usability and usefulness has to be considered. Specifically, the authors integrate threat modelling with the socio-technical security modelling language (STS-ml), introduce automated analysis techniques that propagate threats in the combined models, and present tool support that enables reuse of threats facilitated by a threat repository. The authors illustrate their approach on a case study from the Air Traffic Management (ATM) domain, from which they extract some practical challenges. The authors conclude that threats provide a useful foundation and justification for the security requirements that the authors derive from goal modelling, but this should not be considered as a replacement to risk assessment. The usage of goals and threats early in the development process allows raising awareness of high-level security issues that occur regardless of the chosen technology and organizational processes.

Kategori

Vitenskapelig artikkel

Språk

Engelsk

Forfatter(e)

  • Per Håkon Meland
  • Elda Paja
  • Erlend Andreas Gjære
  • Stéphane Paul
  • Fabiano Dalpiaz
  • Paolo Giorgini

Institusjon(er)

  • SINTEF Digital / Software Engineering, Safety and Security
  • Università degli Studi di Trento
  • Frankrike
  • Universiteit Utrecht

År

2014

Publisert i

International Journal of Secure Software Engineering (IJSSE)

ISSN

1947-3036

Forlag

IGI Global

Årgang

5

Hefte nr.

2

Vis denne publikasjonen hos Cristin