Abstract

Both goal and threat modelling are well-known activities related to high-level requirements engineering. While goals express why a system is needed, threats tell us why security for our system is needed. Still, you will often find that goals and threats are treated in separate modelling processes, perhaps not being influenced by each other at all. The research question we try to address in here is to what extent should we include threats in goal-oriented modelling? There is for instance a trade-off between expressiveness, usability and usefulness that must be considered. To improve this situation we believe that a well-defined methodology with good tool support will make the modelling process easier, and give a more useful result. In this paper we first give an overview of previous work on the use of threats within goal-modelling. We explain the use of threats within a goal-oriented socio-technical security modelling language and how tool support enables reuse of threats and automatic analysis of threat propagation in the models. This is exemplified with a case study from Air Traffic Management (ATM) from which we extract some of the the practical challenges that we have. We are able to conclude that threats provide a useful foundation and justification for the security requirements we derive from goal modelling, but this should not be considered to be a replacement for risk assessment methods. Having goals and threats before thinking of the technical solutions of a system allows us to raise awareness on situations that are not just exceptions from regular execution flow.


Original document

The different versions of the original document can be found in:

http://dx.doi.org/10.1109/ares.2013.57
https://ieeexplore.ieee.org/document/6657273,
http://ieeexplore.ieee.org/document/6657273,
https://www.researchgate.net/profile/Stephane_Paul2/publication/261338189_The_Use_and_Usefulness_of_Threats_in_Goal-Oriented_Modelling/links/5559915d08ae6943a876c3a8.pdf?disableCoverPage=true,
https://dl.acm.org/citation.cfm?id=2545231,
https://academic.microsoft.com/#/detail/2086416991
Back to Top

Document information

Published on 31/12/12
Accepted on 31/12/12
Submitted on 31/12/12

Volume 2013, 2013
DOI: 10.1109/ares.2013.57
Licence: CC BY-NC-SA license

Document Score

0

Views 1
Recommendations 0

Share this document

claim authorship

Are you one of the authors of this document?