Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment

  • Conference paper
  • First Online:
Requirements Engineering: Foundation for Software Quality (REFSQ 2017)

Abstract

Context: Many security risk assessment methods are proposed both in academia (typically with a graphical notation) and industry (typically with a tabular notation).Question: We compare methods based on those two notations with respect to their actual and perceived efficacy when both groups are equipped with a domain-specific security catalogue (as typically available in industry risk assessments).

Results: Two controlled experiments with MSc students in computer science show that tabular and graphical methods are (statistically) equivalent in quality of identified threats and security controls. In the first experiment the perceived efficacy of tabular method was slightly better than the graphical one, and in the second experiment two methods are perceived as equivalent. Contribution: A graphical notation does not warrant by itself better (security) requirements elicitation than a tabular notation in terms of the quality of actually identified requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    For simplicity, we name our previous experiments as “SG2013” [14] and “SG2014” [16], where SG stands for Smart Grid domain used in the experiments.

  2. 2.

    To prevent participants from “auto-pilot” answering, a half of the questions were given in a positive statement and another half in a negative statement.

  3. 3.

    LFV: RTS - One Year In Operation. Available: http://news.cision.com/lfv/r/rts---one-year-in-operation,c9930962.

  4. 4.

    SESAR Project 16.02.03 - ATM Security Risk Assessment Methodology, February 2003. Project aims to analyze existing security risk assessment approaches and adopt them to the ATM domain.

References

  1. Caralli, R., Stevens, J., Young, L., Wilson, W.: Introducing OCTAVE allegro: improving the information security risk assessment process. Technical report, Software Engineering Institute, Carnegie Mellon University (2007)

    Google Scholar 

  2. Carver, J.C., Jaccheri, L., Morasca, S., Shull, F.: A checklist for integrating student empirical studies with research and teaching goals. Empir. Softw. Eng. 15(1), 35–59 (2010)

    Article  Google Scholar 

  3. Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13, 319–340 (1989)

    Article  Google Scholar 

  4. Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulllment of privacy requirements. Req. Eng. 16(1), 3–32 (2011)

    Article  Google Scholar 

  5. Food, D.A.: Guidance for industry: statistical approaches to establishing bioequivalence (2001)

    Google Scholar 

  6. Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling security requirements through ownership, permission and delegation. In: Proceedings of RE 2005, pp. 167–176. IEEE (2005)

    Google Scholar 

  7. de Gramatica, M., Labunets, K., Massacci, F., Paci, F., Tedeschi, A.: The role of catalogues of threats and security controls in security risk assessment: an empirical study with ATM professionals. In: Fricker, S.A., Schneider, K. (eds.) REFSQ 2015. LNCS, vol. 9013, pp. 98–114. Springer, Heidelberg (2015). doi:10.1007/978-3-319-16101-3_7

    Google Scholar 

  8. Haley, C., Laney, R., Moett, J., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133–153 (2008)

    Article  Google Scholar 

  9. Hernan, S., Lambert, S., Ostwald, T., Shostack, A.: Threat modeling-uncover security design flaws using the stride approach. MSDN Magazine-Louisville, pp. 68–75 (2006)

    Google Scholar 

  10. Höst, M., Regnell, B., Wohlin, C.: Using students as subjects: a comparative study of students and professionals in lead-time impact assessment. Empir. Softw. Eng. 5(3), 201–214 (2000)

    Article  MATH  Google Scholar 

  11. Karpati, P., Redda, Y., Opdahl, A.L., Sindre, G.: Comparing attack trees and misuse cases in an industrial setting. Inform. Soft. Technol. 56(3), 294–308 (2014)

    Article  Google Scholar 

  12. Kopardekar, P.H.: Unmanned aerial system (UAS) traffic management (UTM): Enabling low-altitude airspace and UAS operations. Technical report (2014)

    Google Scholar 

  13. Kopardekar, P.H.: Revising the airspace model for the safe integration of small unmanned aircraft systems. Technical report (2015)

    Google Scholar 

  14. Labunets, K., Massacci, F., Paci, F., Tran, L.M.S.: An experimental comparison of two risk-based security methods. In: Proceedings of ESEM 2013, pp. 163–172. IEEE (2013)

    Google Scholar 

  15. Labunets, K., Paci, F., Massacci, F., Ragosta, M., Solhaug, B.: A first empirical evaluation framework for security risk assessment methods in the ATM domain. In: Proceedings of SIDs 2014. SESAR (2014)

    Google Scholar 

  16. Labunets, K., Paci, F., Massacci, F., Ruprai, R.: An experiment on comparing textual vs. visual industrial methods for security risk assessment. In: Proceedings of EmpiRE Workshop at RE 2014, pp. 28–35. IEEE (2014)

    Google Scholar 

  17. Landoll, D.J., Landoll, D.: The Security Risk Assessment Handbook: A Complete Guide For Performing Security Risk Assessments. CRC Press, New York (2005)

    Book  Google Scholar 

  18. Li, T., Horkoff, J.: Dealing with security requirements for socio-technical systems: a holistic approach. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 285–300. Springer, Heidelberg (2014). doi:10.1007/978-3-319-07881-6_20

    Google Scholar 

  19. Lund, M.S., Solhaug, B., Stolen, K.: A guided tour of the CORAS method. In: Lund, M.S., Solhaug, B., Stolen, K. (eds.) Model-Driven Risk Analysis, pp. 23–43. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  20. Maiden, N., Robertson, S., Ebert, C.: Guest editors’ introduction: shake, rattle, and requirements. IEEE Softw. 22(1), 13 (2005)

    Article  Google Scholar 

  21. Massacci, F., Paci, F.: How to select a security requirements method? A Comparative study with students and practitioners. In: Jøsang, A., Carlsson, B. (eds.) NordSec 2012. LNCS, vol. 7617, pp. 89–104. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34210-3_7

    Chapter  Google Scholar 

  22. Mellado, D., Fernández-Medina, E., Piattini, M.: Applying a security requirements engineering process. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 192–206. Springer, Heidelberg (2006). doi:10.1007/11863908_13

    Chapter  Google Scholar 

  23. Meyners, M.: Equivalence tests a review. Food Qual. Prefer. 26(2), 231–245 (2012)

    Article  Google Scholar 

  24. Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Inform. Syst. Model. Des. 17(02), 285–309 (2007)

    Google Scholar 

  25. Opdahl, A.L., Sindre, G.: Experimental comparison of attack trees and misuse cases for security threat identification. Inform. Soft. Tech. 51(5), 916–932 (2009)

    Article  Google Scholar 

  26. Scandariato, R., Wuyts, K., Joosen, W.: A descriptive study of Microsoft’s threat modeling technique. Req. Eng. 20, 1–18 (2014)

    Google Scholar 

  27. Schuirmann, D.: On hypothesis-testing to determine if the mean of a normal distribution is contained in a known interval. In: Biometrics. vol. 37, pp. 617-617. International Biometric Soc (1981)

    Google Scholar 

  28. SESAR: ATM Security Risk Assessment Methodology. SESAR WP16.2 ATM Security, February 2003

    Google Scholar 

  29. Stålhane, T., Sindre, G.: Identifying safety hazards: an experimental comparison of system diagrams and textual use cases. In: Bider, I., Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer, P., Wrycza, S. (eds.) BPMDS/EMMSAD -2012. LNBIP, vol. 113, pp. 378–392. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31072-0_26

    Chapter  Google Scholar 

  30. Stålhane, T., Sindre, G.: Identifying safety hazards: an experimental comparison of system diagrams and textual use cases. In: Bider, I., Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer, P., Wrycza, S. (eds.) BPMDS/EMMSAD -2012. LNBIP, vol. 113, pp. 378–392. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31072-0_26

    Chapter  Google Scholar 

  31. Stålhane, T., Sindre, G.: An experimental comparison of system diagrams and textual use cases for the identification of safety hazards. Int. J. Inform. Syst. Model. Des. 5(1), 1–24 (2014)

    Article  Google Scholar 

  32. Stålhane, T., Sindre, G., Bousquet, L.: Comparing safety analysis based on sequence diagrams and textual use cases. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol. 6051, pp. 165–179. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13094-6_14

    Chapter  Google Scholar 

  33. Svahnberg, M., Aurum, A., Wohlin, C.: Using students as subjects - an empirical evaluation. In: Proceedings of ESEM 2008, pp. 288–290. ACM (2008)

    Google Scholar 

  34. Theilmann, C.A.: Integrating autonomous drones into the national aerospace system. Ph.D. thesis, University of Pennsylvania, PA, US, April 2015

    Google Scholar 

  35. Van Lamsweerde, A.: Goal-oriented requirements engineering: a guided tour. In: Proceedings of RE 2001, pp. 249–262. IEEE (2001)

    Google Scholar 

  36. Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B., Wesslen, A.: Experimentation in Software Engineering. Springer, Heidelberg (2012)

    Book  MATH  Google Scholar 

Download references

Acknowledgment

This work has been partly supported by the SESAR JU WPE under contract 12-120610-C12 (EMFASE).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Katsiaryna Labunets .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Labunets, K., Massacci, F., Paci, F. (2017). On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment. In: Grünbacher, P., Perini, A. (eds) Requirements Engineering: Foundation for Software Quality. REFSQ 2017. Lecture Notes in Computer Science(), vol 10153. Springer, Cham. https://doi.org/10.1007/978-3-319-54045-0_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54045-0_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54044-3

  • Online ISBN: 978-3-319-54045-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics