Model based risk management of security critical systems

被引:0
|
作者
Djordjevic, I [1 ]
Gan, C [1 ]
Scharf, E [1 ]
Mondragon, R [1 ]
Gran, BA [1 ]
Kristiansen, M [1 ]
Dimitrakos, T [1 ]
Stolen, K [1 ]
Opperud, TA [1 ]
机构
[1] Univ London Queen Mary Coll, Dept Elect Engn, London E1 4NS, England
来源
RISK ANALYSIS III | 2002年 / 5卷
关键词
D O I
暂无
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
This paper describes a novel framework for a risk management process involving a model-based approach, developed as the main objective of CORAS (IST-2000 25031). The main motivation for this approach is to achieve an improved methodology for precise, unambiguous, and efficient risk analysis of security critical systems. There are several benefits from a model-based approach. Firstly, the description of the target system, its context and all security relevant features required for risk analysis, can be improved by applying state-of-the-art modelling technology. Secondly, it provides a rich set of graphical descriptions that address properties of the target system as well as their context (including the behaviour of humans), which improves communication and interaction between stakeholders involved in a risk analysis and also facilitates the formalization of threats and more precise documentation of risk analysis results and the assumptions. Finally, tighter integration of risk management in the system development process may considerably reduce the development costs. In this paper we place the emphasis on the proposed guidelines and recommendations for model-based risk management, which will be evaluated through trials in the e-commerce and telemedicine areas. Since CORAS is an ongoing project, the research described here is work in progress.
引用
收藏
页码:253 / 264
页数:12
相关论文
共 50 条
  • [31] Monitoring the Effectiveness of Security Countermeasures in a Security Risk Management Model
    Rjaibi, Neila
    Rabai, Latifa Ben Arfa
    [J]. SOFTWARE ENGINEERING IN INTELLIGENT SYSTEMS (CSOC2015), VOL 3, 2015, 349 : 327 - 337
  • [32] A checklist based evaluation framework to measure risk of information security management systems
    Mortazavi S.A.R.
    Safi-Esfahani F.
    [J]. International Journal of Information Technology, 2019, 11 (3) : 517 - 534
  • [33] Model-based assurance evidence management for safety–critical systems
    Jose Luis de la Vara
    Arturo S. García
    Jorge Valero
    Clara Ayora
    [J]. Software and Systems Modeling, 2022, 21 (6): : 2329 - 2365
  • [34] Context-Based Risk-Adaptive Security Model and Conflict Management
    Teimourikia, Mahsa
    Marilli, Guido
    Fugini, Mariagrazia
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2016, PT I, 2016, 9827 : 121 - 135
  • [35] Cyber Security Risk Management in the SCADA Critical Infrastructure Environment
    Henrie, Morgan
    [J]. ENGINEERING MANAGEMENT JOURNAL, 2013, 25 (02) : 38 - 45
  • [36] A security risk analysis model for information systems
    In, HP
    Kim, YG
    Lee, T
    Moon, CJ
    Jung, YJ
    Kim, I
    [J]. SYSTEMS MODELING AND SIMULATION: THEORY AND APPLICATIONS, 2005, 3398 : 505 - 513
  • [37] Information Security Management Systems - A Maturity Model Based on ISO/IEC 27001
    Proenca, Diogo
    Borbinha, Jose
    [J]. BUSINESS INFORMATION SYSTEMS (BIS 2018), 2018, 320 : 102 - 114
  • [38] Security and Intrusion Detection on Critical SCADA Systems for Water Management
    Stoian, I.
    Ignat, S.
    Capatina, D.
    Ghiran, O.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS, 2014,
  • [39] Critical success factors for risk management systems
    Yaraghi, Niam
    Langhe, Roland G.
    [J]. JOURNAL OF RISK RESEARCH, 2011, 14 (05) : 551 - 581
  • [40] Management of Security and Security for Management Systems
    Westphall, Carlos Becker
    Mueller, Peter
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2010, 18 (03) : 241 - 243