Contexts in source publication

Context 1
... idea is that the well accepted techniques for specification and design of functionality are also suited to modelling of misfunctionality. This is illustrated by the misuse cases [19] in Figure 3. ...
Context 2
... design process thus needs to take into account both desired and undesired behaviour and benevolent actors as well as malicious actors. As shown in Figure 3, modelling can be used for both aspects, providing a complete documentation of the system design including information about risks. ...

Citations

... This method needs expertise, and it is time consuming, as they need to identify assets, vulnerability, threat scenario, risk. Vraalsen et al. [22] argued that it is difficult to assess the scalability 3 of the CORAS framework, but it does not give any indications that it doesn't scale well. ...
Conference Paper
Background – Risk Analysis is an integral part of management practice and an essential element of good corporate governance. There are many risk analysis methods available today, and it is a tedious task for an organization (particularly small and mid-scale company) to choose the proper method. Problem – Although many methods and tools are available in this domain, very few inventories do exist that are structured according to a set of common properties. There are many risk analysis methods available today, and the main task for an organization is to determine which one to use. Contribution – The objective of this review paper is to provide researchers, an analysis of four risk analysis methods using the Campbell et al. classification scheme. The major contributions of this paper are; 1) Present a summary of four Information Security Risk analysis methods using ontology, 2) Classify these risk analysis methods using Campbell et al. classification scheme, 3) Compare risk analysis methods based on generic attributes i.e. input, outcome, purpose, effort, scalability, methodology, etc.
... CORAS is a framework containing a method for model-based risk assessment, a UML profile for risk assessment relevant system documentation and a software tool (V4) for managing re-usable experience packages (C4) and assessment results, which are described in an XML based format [17]. The framework is a collection of multiple methods and techniques. ...
... This requires constant involvement of a specialist that can choose suitable techniques for data collection. Collaboration is often organized in the form of physical meetings with all stakeholders together with a security expert, as in the CORAS method (Vraalsen, den Braber et al. 2004). ...
Conference Paper
Full-text available
The standardization of network protocols and software components in embedded systems development has introduced security threats that have been common before in e-commerce and office systems into the domain of critical infrastructures. The ESSAF framework presented in this paper lays the ground for collaborative, structured security assessments during the design and development phase of these systems. Its three phases system modeling, security modeling and mitigation planning guide software developers in the independent assessment of their product's security, minimizing the burden on security experts in the collection of security relevant data.
... In CORAS, the final result on which decisions can be based is the UML class diagrams of each asset. For more information refer to references [Lund et al. 2004;Aagedal et al. 2002;Vraalsen et al. 2004;Fredriksen et al. 2001;Raptis et al. 2002;. ...
Article
Full-text available
________________________________________________________________________________________________ Organisations wanting to conduct information security risk analysis may find selecting a methodology problematic. Currently there are numerous risk analysis methodologies available, some of which are qualitative while others are more quantitative in nature. These methodologies have a common goal of estimating the overall risk value. An organisation must select the most appropriate methodology based on its specific needs. This article addresses the problem by presenting a framework that can be used to compare different risk analysis methodologies. Five methodologies, which are currently available, were analysed in order to establish the framework for comparison.
Chapter
Taking pragmatic, systems engineering approach, this paper identifies a number of fundamental issues that presently arise in risk management, primarily as a result of the overly complex approach conventionally taken in process definition and a lack of coherence within the current risk management vocabulary. The aim of the paper is to enable a fundamental simplification of the risk management process and an improved understanding of the associated terminology. The outcome of this work is a formalised but pragmatic approach to risk management resulting in the development of a conceptual framework and an associated ontology, which emphasises the understanding of people and their environment as part of risk management. The approach has been validated in a number of case studies of varying depth and breadth from the IT domain, defence, rail industry, and education, covering health and safety, business, project and individual needs.
Conference Paper
Full-text available
Neste trabalho procuramos evidenciar a contribuição da modelação de processos para a utilização de metodologias de identificação do risco associado a transacções organizacionais. Damos particular atenção à identificação do risco associado ao processo TEID (Transferência Electrónica Interbancária Doméstica) com o nível de detalhe necessário numa abordagem “micro”. Como suporte metodológico à modelação do referido processo Utilizamos a framework CEO e com base nos modelos obtidos identificamos o risco no âmbito da framework proposta pelo projecto europeu CORAS (Risk Assessment Security Critical Systems). A proposta apresentada neste trabalho, ilustrada com exemplo específico, pode obviamente ser alargada a todas as transacções organizacionais.
Conference Paper
There is an increasing use of cloud computing in information technology (IT) with the widening scope of cloud computing. However, some service owners are reluctant to adopt cloud computing because the associated security technologies have not yet matured. Cloud service providers need to invest in security to improve the use of cloud computing. Additionally, research on the security investment in cloud computing is still in its early stages; due to the lack of related work, most companies or organizations should not provide an unlimited budget for security investment. Therefore, we devised an optimal investment scheme for constructing cloud security services that considers budget and the features of cloud computing services. This scheme includes an evaluation of security vulnerabilities concerning potential security attacks, and we performed an evaluation of a security investment strategy based on attack tree map (ATM) that analyze cloud security threat and vulnerabilities. Finally, we demonstrated the proposed scheme by examining two case studies using different security investment strategies.
Article
There are already many models of risk assessment and more are emerging every day. They all have the same fundamental target, but most attempt to hit the target from very different approaches. Some approaches can be applied to all types of risk, while others are specific to particular risks. A particularly dangerous risk in the global economy today is the security of information. Information is a key asset for organizations, and reducing the risk of information compromise is a high priority. This study proposed a methodology for information security risk analysis in which the assets, vulnerabilities, threats, and controls of an organization are linked. The main purpose of the study is to compare and clarify the different activities, inputs, and outputs required by each model of information security risk assessment and the analysis that effectively addresses the risks of information security. At the moment, there are numerous risk analysis methodologies available, some of which are qualitative while others are more quantitative in nature. These methodologies have a common goal to estimate the overall value of risk. An organization must choose the most proper methodology based on their specific requirements
Article
Based on Network Security Situation Awareness framework, combined with DS Theory and CORAS, this paper proposes a Network Security Situation Awareness Risk Assessment Model. Then, we take Low Earth Orbit (LEO) Satellite Communications Network as an example to make a simulation and assessment. Through the experiment, the proposed model and method are verified to be valid.
Article
There are already many models of risk assessment and more are emerging every day. They all have the same fundamental target, but most attempt to hit the target from very different approaches. Some approaches can be applied to all types of risk, while others are specific to particular risks. A particularly dangerous risk in the global economy today is the security of information. Information is a key asset for organizations, and reducing the risk of information compromise is a high priority. This study proposed a methodology for information security risk analysis in which the assets, vulnerabilities, threats, and controls of an organization are linked. The main purpose of the study is to compare and clarify the different activities, inputs, and outputs required by each model of information security risk assessment and the analysis that effectively addresses the risks of information security. At the moment, there are numerous risk analysis methodologies available, some of which are qualitative while others are more quantitative in nature. These methodologies have a common goal to estimate the overall value of risk. An organization must choose the most proper methodology based on their specific requirements.