dc.contributor.author
Angermeier, Daniel
dc.contributor.author
Wester, Hannah
dc.contributor.author
Beilke, Kristian
dc.contributor.author
Hansch, Gerhard
dc.contributor.author
Eichler, Jörn
dc.date.accessioned
2023-05-24T07:58:31Z
dc.date.available
2023-05-24T07:58:31Z
dc.identifier.uri
https://refubium.fu-berlin.de/handle/fub188/39509
dc.identifier.uri
http://dx.doi.org/10.17169/refubium-39227
dc.description.abstract
Security risk assessment is an important task in systems engineering. It is used to derive security requirements for a secure system design and to evaluate design alternatives as well as vulnerabilities. Security risk assessment is also a complex and interdisciplinary task, where experts from the application domain and the security domain have to collaborate and understand each other. Automated and tool-supported approaches are desired to help manage the complexity. However, the models used for system engineering usually focus on functional behavior and lack security-related aspects. Therefore, we present our modeling approach that alleviates communication between the involved experts and features steps of computer-aided modeling to achieve consistency and avoid omission errors. We demonstrate our approach with an example. We also describe how to model impact rating and attack feasibility estimation in a modular fashion, along with the propagation and aggregation of these estimations through the model. As a result, experts can make local decisions or changes in the model, which in turn provides the impact of these decisions or changes on the overall risk profile. Finally, we discuss the advantages of our model-based method.
en
dc.format.extent
25 Seiten
dc.rights.uri
https://creativecommons.org/licenses/by/4.0/
dc.subject
Security risk assessment
en
dc.subject
risk analysis
en
dc.subject
security engineering
en
dc.subject.ddc
000 Informatik, Informationswissenschaft, allgemeine Werke::000 Informatik, Wissen, Systeme::004 Datenverarbeitung; Informatik
dc.title
Security Risk Assessments: Modeling and Risk Level Propagation
dc.type
Wissenschaftlicher Artikel
dcterms.bibliographicCitation.articlenumber
8
dcterms.bibliographicCitation.doi
10.1145/3569458
dcterms.bibliographicCitation.journaltitle
ACM Transactions on Cyber-Physical Systems
dcterms.bibliographicCitation.number
1
dcterms.bibliographicCitation.volume
7
dcterms.bibliographicCitation.url
https://doi.org/10.1145/3569458
refubium.affiliation
Mathematik und Informatik
refubium.affiliation.other
Institut für Informatik
refubium.resourceType.isindependentpub
no
dcterms.accessRights.openaire
open access
dcterms.isPartOf.eissn
2378-9638
refubium.resourceType.provider
WoS-Alert