IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Threat and Risk-Driven Security Requirements Engineering

Threat and Risk-Driven Security Requirements Engineering
View Sample PDF
Author(s): Holger Schmidt (Technical University of Dortmund, Germany)
Copyright: 2013
Pages: 17
Source title: Contemporary Challenges and Solutions for Mobile and Multimedia Technologies
Source Author(s)/Editor(s): Ismail Khalil (Johannes Kepler University Linz, Austria)and Edgar Weippl (Secure Business Austria - Security Research, Austria)
DOI: 10.4018/978-1-4666-2163-3.ch003

Purchase

View Threat and Risk-Driven Security Requirements Engineering on the publisher's website for pricing and purchasing information.

Abstract

In this paper, the author aim to present a threat and risk-driven methodology to security requirements engineering. The chosen approach has a strong focus on gathering, modeling, and analyzing the environment in which a secure ICT-system to be built is located. The knowledge about the environment comprises threat and risk models. As presented in the paper, this security-relevant knowledge is used to assess the adequacy of security mechanisms, which are then selected to establish security requirements.

Related Content

Tapan Kumar Behera. © 2023. 20 pages.
B. Narendra Kumar Rao. © 2023. 17 pages.
Blendi Rrustemi, Deti Baholli, Herolind Balaj. © 2023. 18 pages.
Alma Beluli. © 2023. 11 pages.
Jona Ndrecaj, Shkurte Berisha, Erita Çunaku. © 2023. 15 pages.
Yllka Totaj. © 2023. 12 pages.
Hla Myo Tun, Devasis Pradhan. © 2023. 31 pages.
Body Bottom