2023
DOI: 10.1016/j.cose.2023.103179
|View full text |Cite
|
Sign up to set email alerts
|

A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…STPA-Sec maintains the same four basic steps as STPA, but essentially introduces threat/vulnerability identification in the last step [ 44 ]. Sahay et al [ 45 ] evaluated and compared the application of STPA-Sec, STRIDE, and CORAS in identifying threats and vulnerabilities to the cybership system. Based on the results of the analysis, STRIDE provides a structured approach to highlight threats to the system that can be combined with CORAS and STPA-Sec to make them more effective.…”
Section: Related Workmentioning
confidence: 99%
“…STPA-Sec maintains the same four basic steps as STPA, but essentially introduces threat/vulnerability identification in the last step [ 44 ]. Sahay et al [ 45 ] evaluated and compared the application of STPA-Sec, STRIDE, and CORAS in identifying threats and vulnerabilities to the cybership system. Based on the results of the analysis, STRIDE provides a structured approach to highlight threats to the system that can be combined with CORAS and STPA-Sec to make them more effective.…”
Section: Related Workmentioning
confidence: 99%
“…The study in [24] applied FTA and STPA analysis methods to a safety critical BBW system, and a comparison of the two reveals that STPA identifies more causal factors. The study in [25] compared three risk analysis methods to identify threats and vulnerabilities in a CyberShip system, and STPA is good at identifying hazards by looking at the control actions and the structure of the CyberShip system. Therefore, STPA techniques, upon which systems thinking is based, are uniquely suited in the field of hazard analysis of complex systems to accurately and more broadly identify causal factors.…”
Section: Introductionmentioning
confidence: 99%
“…Considering the security aspect Although we have not considered security aspects at this stage, we believe it would be appropriate to incorporate the STRIDE methodology, a vulnerability assessment method, into the process for conducting a comparison between the conventional transaction model and the new approach [26].…”
mentioning
confidence: 99%