首页> 外文会议>2011 Sixth International Conference on Availability, Reliability and Security >Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations
【24h】

Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations

机译:滥用案例图与滥用案例和系统架构图的实验性比较,以消除安全漏洞和缓解措施

获取原文

摘要

The idea of security aware system development from the start of the engineering process is generally accepted nowadays and is becoming applied in practice. Many recent initiatives support this idea with special focus on security requirements elicitation. However, there are so far no techniques that provide integrated overviews of security threats and system architecture. One way to achieve this is by combining misuse cases with use case maps into misuse case maps (MUCM). This paper presents an experimental evaluation of MUCM diagrams focusing on identification of vulnerabilities and mitigations. The controlled experiment with 33 IT students included a complex hacker intrusion from the literature, illustrated either with MUCM or with alternative diagrams. The results suggest that participants using MUCM found significantly more mitigations than participants using regular misuse cases combined with system architecture diagrams.
机译:从工程过程开始就开发具有安全意识的系统的想法如今已广为接受,并在实践中得到应用。最近的许多计划都特别关注安全性需求的获取,从而支持了这一想法。但是,到目前为止,还没有任何技术可以提供有关安全威胁和系统体系结构的综合概述。实现此目的的一种方法是将滥用案例和使用案例图组合成滥用案例图(MUCM)。本文介绍了MUCM图的实验评估,重点是确定漏洞和缓解措施。这项针对33名IT专业学生的受控实验包括来自文献的复杂黑客入侵,可用MUCM或其他示意图进行说明。结果表明,使用MUCM的参与者发现的缓解措施比使用常规滥用案例并结合系统架构图的参与者显着多。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号