Model based risk management of security critical systems

被引:0
|
作者
Djordjevic, I [1 ]
Gan, C [1 ]
Scharf, E [1 ]
Mondragon, R [1 ]
Gran, BA [1 ]
Kristiansen, M [1 ]
Dimitrakos, T [1 ]
Stolen, K [1 ]
Opperud, TA [1 ]
机构
[1] Univ London Queen Mary Coll, Dept Elect Engn, London E1 4NS, England
来源
RISK ANALYSIS III | 2002年 / 5卷
关键词
D O I
暂无
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
This paper describes a novel framework for a risk management process involving a model-based approach, developed as the main objective of CORAS (IST-2000 25031). The main motivation for this approach is to achieve an improved methodology for precise, unambiguous, and efficient risk analysis of security critical systems. There are several benefits from a model-based approach. Firstly, the description of the target system, its context and all security relevant features required for risk analysis, can be improved by applying state-of-the-art modelling technology. Secondly, it provides a rich set of graphical descriptions that address properties of the target system as well as their context (including the behaviour of humans), which improves communication and interaction between stakeholders involved in a risk analysis and also facilitates the formalization of threats and more precise documentation of risk analysis results and the assumptions. Finally, tighter integration of risk management in the system development process may considerably reduce the development costs. In this paper we place the emphasis on the proposed guidelines and recommendations for model-based risk management, which will be evaluated through trials in the e-commerce and telemedicine areas. Since CORAS is an ongoing project, the research described here is work in progress.
引用
收藏
页码:253 / 264
页数:12
相关论文
共 50 条
  • [1] Information Security Risk Management in Critical Informative Systems
    Kiran, K. V. D.
    Reddy, L. S. S.
    Kumar, Velagapudi Pavan
    Dheeraj, Kalluri Krishna Sai
    [J]. 2014 CONFERENCE ON IT IN BUSINESS, INDUSTRY AND GOVERNMENT (CSIBIG), 2014,
  • [2] Risk management-based security evaluation model for telemedicine systems
    Dong-won Kim
    Jin-young Choi
    Keun-hee Han
    [J]. BMC Medical Informatics and Decision Making, 20
  • [3] Risk management-based security evaluation model for telemedicine systems
    Kim, Dong-won
    Choi, Jin-young
    Han, Keun-hee
    [J]. BMC MEDICAL INFORMATICS AND DECISION MAKING, 2020, 20 (01)
  • [4] An Ontology-Based Security Risk Management Model for Information Systems
    Arogundade, Oluwasefunmi T.
    Abayomi-Alli, Adebayo
    Misra, Sanjay
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (08) : 6183 - 6198
  • [5] An Ontology-Based Security Risk Management Model for Information Systems
    Oluwasefunmi T. Arogundade
    Adebayo Abayomi-Alli
    Sanjay Misra
    [J]. Arabian Journal for Science and Engineering, 2020, 45 : 6183 - 6198
  • [6] MANAGEMENT AND BUSINESS MODEL RISK PROFILE IN SECURITY SYSTEMS DEVELOPMENT
    Panevski, Valeri
    [J]. COMPTES RENDUS DE L ACADEMIE BULGARE DES SCIENCES, 2024, 77 (04): : 569 - 575
  • [7] A decision model based security risk management approach
    Bhattacharya, Somak
    Ghosh, S. K.
    [J]. IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 1194 - 1199
  • [8] Cyber Security Risk Management for Health-based Critical Infrastructures
    Athinaiou, Myrsini
    [J]. 2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2017, : 402 - 407
  • [9] Integrating model-based security risk management into eBusiness systems development - The CORAS approach
    Dimitrakos, T
    Ritchie, B
    Raptis, D
    Aagedal, JO
    den Braber, F
    Stolen, K
    Houmb, SH
    [J]. TOWARDS THE KNOWLEDGE SOCIETY: E-COMMERCE, E-BUSINESS, AND E-GOVERNMENT, 2003, 105 : 159 - 175
  • [10] Cloud Security Risk Management A Critical Review
    Damenu, Temesgen Kitaw
    Balakrishna, Chitra
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 370 - 375