Proceedings of the 1st International Workshop on Security Awareness From Design to Deployment 2018
DOI: 10.1145/3194707.3194710
|View full text |Cite
|
Sign up to set email alerts
|

Risk-based design security analysis

Abstract: Implementing security by design in practice often involves the application of threat modeling to elicit security threats and to aid designers in focusing efforts on the most stringent problems first. Existing threat modeling methodologies are capable of generating lots of threats, yet they lack even basic support to triage these threats, except for relying on the expertise and manual assessment by the threat modeler. Since the essence of creating a secure design is to minimize associated risk (and countermeasu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

4
4

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 10 publications
(18 reference statements)
0
13
0
1
Order By: Relevance
“…Such analyses can be further enriched with the incorporation of the information from the data protection view: (i) data types and their sensitivity through DataStores and DataFlows, (ii) data subject types through ExternalEntities or via the DataTypes, (iii) the nature of the processing activities through the Processes. After identifying the threats in the previous step, a risk estimation can be performed [25] for each threat. This estimation step can again be improved with the inclusion of the aforementioned data protection artifacts as resources in the risk estimation.…”
Section: Legal Requirement 3 Automated Decision Making On Special Categories Of Datamentioning
confidence: 99%
See 1 more Smart Citation
“…Such analyses can be further enriched with the incorporation of the information from the data protection view: (i) data types and their sensitivity through DataStores and DataFlows, (ii) data subject types through ExternalEntities or via the DataTypes, (iii) the nature of the processing activities through the Processes. After identifying the threats in the previous step, a risk estimation can be performed [25] for each threat. This estimation step can again be improved with the inclusion of the aforementioned data protection artifacts as resources in the risk estimation.…”
Section: Legal Requirement 3 Automated Decision Making On Special Categories Of Datamentioning
confidence: 99%
“…It does not, however, cover all legal concepts. Other DFD extensions have been proposed in the literature [7], [25], [32], [33]. Examples are security or privacy solutions [7] to take existing countermeasures into account and enable the up-front elimination of inapplicable threats.…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, establishing such thresholds is a challenging task, as it also has to reflect the type of attackers, their capabilities, and the availability of data related to the data set. Profiles of attackers that may be useful for establishing privacy requirements can be found in [16].…”
Section: Knowledge Basementioning
confidence: 99%
“…This section elaborates on a number of risk perspectives that are relevant in the context of privacy threat modeling. Many existing risk assessment approaches focus on either technical failures (e.g., FMEA [12]) or the manifestation of security threats (e.g., FAIR [13], CORAS [14], security threat risk [15]). In these approaches, the risk impact depends on the value of business assets or the level of criticality of technical components or services.…”
Section: B Perspectives On Privacy Riskmentioning
confidence: 99%