Assessment of Risk Perception in Security Requirements Composition

被引:0
|
作者
Hibshi, Hanan [1 ,2 ]
Breaux, Travis D. [1 ]
Broomell, Stephen B. [3 ]
机构
[1] Carnegie Mellon Univ, Inst Software Res, Pittsburgh, PA 15213 USA
[2] King Abdulaziz Univ, Coll Comp, Jeddah, Saudi Arabia
[3] Carnegie Mellon Univ, Dept Social & Decis Sci, Pittsburgh, PA 15213 USA
关键词
user study; vignettes; factor surveys; security requirements; requirements elicitation;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security requirements analysis depends on how well-trained analysts perceive security risk, understand the impact of various vulnerabilities, and mitigate threats. When systems are composed of multiple machines, configurations, and software components that interact with each other, risk perception must account for the composition of security requirements. In this paper, we report on how changes to security requirements affect analysts risk perceptions and their decisions about how to modify the requirements to reach adequate security levels. We conducted two user surveys of 174 participants wherein participants assess security levels across 64 factorial vignettes. We analyzed the survey results using multi-level modeling to test for the effect of security requirements composition on participants' overall security adequacy ratings and on their ratings of individual requirements. We accompanied this analysis with grounded analysis of elicited requirements aimed at lowering the security risk. Our results suggest that requirements composition affects experts' adequacy ratings on security requirements. In addition, we identified three categories of requirements modifications, called refinements, replacements and reinforcements, and we measured how these categories compare with overall perceived security risk. Finally, we discuss the future impact of our work in security requirements assessment practice.
引用
收藏
页码:146 / 155
页数:10
相关论文
共 50 条
  • [21] Security Requirements in Web Service Composition: Formalization, Integration and Verification
    El Kassmi, Ilyass
    Jarir, Zahi
    2016 IEEE 25TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2016, : 179 - 184
  • [22] Critical requirements for successful on-line security assessment
    Morison, K
    Wang, L
    Lin, X
    Gao, WJ
    Xue, F
    Xu, JB
    Kundur, P
    He, CY
    Xu, TS
    Xue, YS
    2004 IEEE PES POWER SYSTEMS CONFERENCE & EXPOSITION, VOLS 1 - 3, 2004, : 1676 - 1680
  • [23] Empirical assessment of security requirements and architecture: Lessons learned
    Scandariato, Riccardo
    Paci, Federica
    Tran, Le Minh Sang
    Labunets, Katsiaryna
    Yskout, Koen
    Massacci, Fabio
    Joosen, Wouter
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8431 : 35 - 64
  • [24] Empirical assessment of security requirements and architecture: Lessons learned
    Scandariato, Riccardo
    Paci, Federica
    Tran, Le Minh Sang
    Labunets, Katsiaryna
    Yskout, Koen
    Massacci, Fabio
    Joosen, Wouter
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8431 : 35 - 64
  • [25] Assessing System of Systems Security Risk and Requirements with OASoSIS
    Ki-Aries, Duncan
    Faily, Shamal
    Dogan, Huseyin
    Williams, Christopher
    2018 IEEE 5TH INTERNATIONAL WORKSHOP ON EVOLVING SECURITY & PRIVACY REQUIREMENTS ENGINEERING (ESPRE 2018), 2018, : 14 - 20
  • [26] Risk sharing for capital requirements with multidimensional security markets
    Liebrich, Felix-Benedikt
    Svindland, Gregor
    FINANCE AND STOCHASTICS, 2019, 23 (04) : 925 - 973
  • [27] Comparing risk identification techniques for safety and security requirements
    Raspotnig, Christian
    Opdahl, Andreas
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (04) : 1124 - 1151
  • [28] Threat and Risk-Driven Security Requirements Engineering
    Schmidt, Holger
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2011, 3 (01) : 35 - 50
  • [29] Requirements Analysis for the Evaluation of Automated Security Risk Assessments
    Ehrlich, Marco
    Lukas, Georg
    Trsek, Henning
    Jasperneite, Juegen
    Kastner, Wolfgang
    Diedrich, Christian
    2024 IEEE 20TH INTERNATIONAL CONFERENCE ON FACTORY COMMUNICATION SYSTEMS, WFCS, 2024, : 180 - 183
  • [30] Risk sharing for capital requirements with multidimensional security markets
    Felix-Benedikt Liebrich
    Gregor Svindland
    Finance and Stochastics, 2019, 23 : 925 - 973