Assessment of Risk Perception in Security Requirements Composition

被引:0
|
作者
Hibshi, Hanan [1 ,2 ]
Breaux, Travis D. [1 ]
Broomell, Stephen B. [3 ]
机构
[1] Carnegie Mellon Univ, Inst Software Res, Pittsburgh, PA 15213 USA
[2] King Abdulaziz Univ, Coll Comp, Jeddah, Saudi Arabia
[3] Carnegie Mellon Univ, Dept Social & Decis Sci, Pittsburgh, PA 15213 USA
关键词
user study; vignettes; factor surveys; security requirements; requirements elicitation;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security requirements analysis depends on how well-trained analysts perceive security risk, understand the impact of various vulnerabilities, and mitigate threats. When systems are composed of multiple machines, configurations, and software components that interact with each other, risk perception must account for the composition of security requirements. In this paper, we report on how changes to security requirements affect analysts risk perceptions and their decisions about how to modify the requirements to reach adequate security levels. We conducted two user surveys of 174 participants wherein participants assess security levels across 64 factorial vignettes. We analyzed the survey results using multi-level modeling to test for the effect of security requirements composition on participants' overall security adequacy ratings and on their ratings of individual requirements. We accompanied this analysis with grounded analysis of elicited requirements aimed at lowering the security risk. Our results suggest that requirements composition affects experts' adequacy ratings on security requirements. In addition, we identified three categories of requirements modifications, called refinements, replacements and reinforcements, and we measured how these categories compare with overall perceived security risk. Finally, we discuss the future impact of our work in security requirements assessment practice.
引用
收藏
页码:146 / 155
页数:10
相关论文
共 50 条
  • [1] Factorial Composition Confirming the Perception of Security
    Marcos Bustos-Aguayo, Jose
    Juarez-Najera, Margarita
    Garcia-Lirios, Cruz
    Yaneth Quiroz-Campas, Celia
    Javier Rosas-Ferruzca, Francisco
    Del Rosario Molina-Gonzalez, Maria
    EUREKA-REVISTA CIENTIFICA DE PSICOLOGIA, 2020, 17 (01): : 85 - 95
  • [2] Risk Assessment of Security Requirements of Banking Information Systems Based on Attack Patterns
    Rongrat, Krissada
    Senivongse, Twittie
    APPLIED COMPUTING & INFORMATION TECHNOLOGY, 2018, 727 : 117 - 133
  • [3] A Case Study of Introducing Security Risk Assessment in Requirements Engineering in a Large Organization
    Ardi S.
    Sandahl K.
    Gustafsson M.
    SN Computer Science, 4 (5)
  • [4] From risk analysis to security requirements
    Gerber, M
    von Solms, R
    COMPUTERS & SECURITY, 2001, 20 (07) : 577 - 584
  • [5] Risk communication, risk perception and information security
    Pattinson, M
    Anderson, G
    Security Management, Integrity, and Internal Control in Information Systems, 2005, 193 : 175 - 184
  • [6] THE ASSESSMENT AND PERCEPTION OF RISK
    BOAG, JW
    DISASTERS, 1983, 7 (02) : 154 - 155
  • [7] Income Security and the Perception of Disability Risk
    Kawinski, Marcin
    Szumlicz, Tadeusz
    CONTEMPORARY ECONOMICS, 2021, 15 (04) : 499 - 510
  • [8] Security Requirements Elicitation and Assessment Mechanism (SecREAM)
    Goel, Rajat
    Govil, M. C.
    Singh, Girdhari
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1862 - 1866
  • [9] New trends and requirements for dynamic security assessment
    Meyer, B
    Nativel, G
    CONTROL OF POWER SYSTEMS AND POWER PLANTS 1997 (CPSPP'97), 1998, : 557 - 562
  • [10] New trends and requirements for dynamic security assessment
    Meyer, B
    Nativel, C
    CONTROL ENGINEERING PRACTICE, 1999, 7 (03) : 375 - 380