2017
DOI: 10.1007/978-3-319-54876-0_6
|View full text |Cite
|
Sign up to set email alerts
|

Towards Empirical Evaluation of Automated Risk Assessment Methods

Abstract: Abstract. Security risk assessment methods are numerous, and it might be confusing for organizations to select one. Researchers have conducted empirical studies with established methods in order to find factors that influence their effectiveness and ease of use. In this paper we evaluate the recent TREsPASS semi-automated risk assessment method with respect to the factors identified as critical in several controlled experiments. We also argue that automation of risk assessment raises new research questions tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…Despite the need for adaptive risk management in the area of maritime sector, currently very few approaches support, to some extent, real-time and ‘live’ risk assessments. These include MEDUSA [ 4 ], MITIGATE [ 5 , 6 ] and TREsPASS [ 10 ], which partially automate the risk assessment process, by enabling users and stakeholders to collaboratively and asynchronously provide their input for conducting dynamic reassessments. Although some automation is supported, they cannot be considered as autonomous risk assessment systems.…”
Section: Related Workmentioning
confidence: 99%
“…Despite the need for adaptive risk management in the area of maritime sector, currently very few approaches support, to some extent, real-time and ‘live’ risk assessments. These include MEDUSA [ 4 ], MITIGATE [ 5 , 6 ] and TREsPASS [ 10 ], which partially automate the risk assessment process, by enabling users and stakeholders to collaboratively and asynchronously provide their input for conducting dynamic reassessments. Although some automation is supported, they cannot be considered as autonomous risk assessment systems.…”
Section: Related Workmentioning
confidence: 99%
“…In Gadyatskaya et al, the authors qualitatively evaluate the TREsPASS methodology, considering four criteria based on the outcomes of pre‐existing empirical evaluations (see later, in Section 8.2.2): process clarity, visualization of risk models, existence of catalogs of threats and security controls, tool support, help in identifying threats and controls, change management, and scalability. These criteria correlate well to the concrete criteria and metrics in our framework—as indeed some of Gadyatskaya et al's criteria are in reality metrics, such as the existence of catalogs of threats—except that in Gadyatskaya et al these criteria are evaluated in an ad hoc fashion, without structure or supporting quality‐related artifacts.…”
Section: Related Workmentioning
confidence: 99%
“…Considerations of (security) methodology quality, often tangentially and not under the designated term or using the relevant quality‐related concepts, can only be found in the context of literature surveys on security methodologies (eg, Uzunov et al, Jayaram and Mathur, and Uzunov et al), a small portion of work concerned with security metrics (Jaatun and Khan and Zulkernine) and metrics for security assurance processes (Ouedraogo et al), and methodology comparisons (Khan and Zulkernine, Gregoire et al, and El Rhaffari and Roudies)—none of which offers independent or self‐contained treatments of the subject. Complementary concepts and approaches can be found in work on security‐oriented maturity models and empirical methodology evaluations; however, the latter focus on one specific quality attribute only, while the former focus on organizational, not technical, aspects, and are not suitable for security methodologies as such. It is not surprising, therefore, that, besides supportive artifacts, the literature also entirely lacks concrete, specifically designed approaches for comprehensive security methodology assessment and improvement.…”
Section: Introductionmentioning
confidence: 99%