2007
DOI: 10.1007/s10550-007-0013-9
|View full text |Cite
|
Sign up to set email alerts
|

Model-based security analysis in seven steps — a guided tour to the CORAS method

Abstract: This paper presents the CORAS method for model-based security analysis. The presentation is case-driven. We follow two analysts in their interaction with an organisation by which they have been hired to carry out a security risk analysis. The analysis is divided into seven main steps, and the paper devotes a separate section to each of them. The paper focuses in particular on the use of the CORAS security risk modelling language as a means for communication and interaction during the seven steps.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
118
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 162 publications
(118 citation statements)
references
References 10 publications
0
118
0
Order By: Relevance
“…It is based on ISO 15408:2007 [89][90][91] and consists of four main components: Figure 2.1: Sub-processes of CORAS risk management process [14] (1) a risk documentation framework based on RM-ODP [69]; (2) a risk management process based on the AS/NZS 4360:2004 [97]; (3) an integrated risk management and system development process based on the Unified Process [28] and (4) a platform for tool inclusion based on data-integration using XML.…”
Section: Background Information 221 Corasmentioning
confidence: 99%
See 4 more Smart Citations
“…It is based on ISO 15408:2007 [89][90][91] and consists of four main components: Figure 2.1: Sub-processes of CORAS risk management process [14] (1) a risk documentation framework based on RM-ODP [69]; (2) a risk management process based on the AS/NZS 4360:2004 [97]; (3) an integrated risk management and system development process based on the Unified Process [28] and (4) a platform for tool inclusion based on data-integration using XML.…”
Section: Background Information 221 Corasmentioning
confidence: 99%
“…During these HazOp sessions, to motivate the attendees to structured thinking, the risk [14] To/From HazOp FTA HazOp…”
Section: Step 4: Threat and Vulnerability Identificationmentioning
confidence: 99%
See 3 more Smart Citations