2007
DOI: 10.1007/s10550-007-0016-6
|View full text |Cite
|
Sign up to set email alerts
|

A risk-driven security analysis method and modelling language

Abstract: The BT Security Research Centre has defined and continues to develop a modelling language and method for representing and analysing ICT security requirements. The language is used to create a model that serves as a medium for communication between consultant and customer, a guide in making decisions, and the basis of a specification for implementing a solution. Three sub-models deal with business and technical requirements of the ICT system; threats, vulnerability and risks; and security measures and processes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Modelling frameworks using such languages have been developed, and in a paper of Kearney the dynamic aspects of risk management are discussed [15].…”
Section: Related Workmentioning
confidence: 99%
“…Modelling frameworks using such languages have been developed, and in a paper of Kearney the dynamic aspects of risk management are discussed [15].…”
Section: Related Workmentioning
confidence: 99%
“…The first step towards security modeling involves designing a scalable model 1, 2 that helps quantify security 3 in terms of key attributes such as the loss caused by attacks 4, 5 or the gain accrued from enforcing a security countermeasure 6. This will aid not only in probabilistic risk analysis (PRA) of a system but also in the development of a scheme as to where in the system, security investment should be prioritized.…”
Section: Introductionmentioning
confidence: 99%
“…It uses a risk documentation framework based on RM-ODP together with an integrated risk management and system development process based on UP and offers a platform for tool inclusion based on XML. In another approach (Baldwin, Beres, Shiu & Kearney, 2006;Kearney & Brügger, 2007) use UML for risk-driven security analysis that focuses on the assessment of risk and analysis of requirements for operational risk management.…”
Section: Model-based Developmentmentioning
confidence: 99%