2006
DOI: 10.1007/11880240_40
|View full text |Cite
|
Sign up to set email alerts
|

A Graphical Approach to Risk Identification, Motivated by Empirical Investigations

Abstract: Abstract. We propose a graphical approach to identify, explain and document security threats and risk scenarios. Security risk analysis can be time consuming and expensive, hence, it is of great importance that involved parties quickly understand the risk picture. Risk analysis methods often make use of brainstorming sessions to identify risks, threats and vulnerabilities. These sessions involve system users, developers and decision makers. They typically often have completely different backgrounds and view th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
5
2
2

Relationship

3
6

Authors

Journals

citations
Cited by 35 publications
(25 citation statements)
references
References 9 publications
0
25
0
Order By: Relevance
“…It also differs from other approaches in that it has been developed to facilitate communication and interaction during structured brainstorming sessions involving people of heterogeneous backgrounds [7,8,21]. To this end the CORAS language makes use of graphical symbols, or icons, that are closely related to the underlying risk analysis concepts, and that are intended to be easily comprehensible.…”
Section: Coras Approachmentioning
confidence: 99%
“…It also differs from other approaches in that it has been developed to facilitate communication and interaction during structured brainstorming sessions involving people of heterogeneous backgrounds [7,8,21]. To this end the CORAS language makes use of graphical symbols, or icons, that are closely related to the underlying risk analysis concepts, and that are intended to be easily comprehensible.…”
Section: Coras Approachmentioning
confidence: 99%
“…The CORAS language has later been customised and rened in several aspects, based on experiences from industrial case studies, and by empirical investigations documented in [5,6,7]. Misuse cases [3,21,22] was an important source of inspiration in the development of the UML prole mentioned above.…”
Section: Related Workmentioning
confidence: 99%
“…15 An asset's capacity is reduced (under-provisioning). 16 An asset is subjected to more use than expected (overuse). 17 An asset commits to do more than it can.…”
Section: Threat Modellingmentioning
confidence: 99%
“…For example, Secure Tropos [14] provides a diagrammatic approach to risk modeling, which has been extended [15] to provide a domain model covering assets, risks and risk treatment related concepts, and asset security criteria for confidentiality, integrity and availability. The CORAS project [16], [17] also used a graphical approach to identify, explain and document security threats and risk scenarios. A graphical notation was developed to perform five security analysis tasks: Context establishment, Risk identification, Risk estimation, Risk evaluation and Treatment identification.…”
Section: Related Workmentioning
confidence: 99%