has been designed for an application during require-
ments engineering, which enables security engineers
in focusing on the most severe risks right from the
beginning of a software development process. The
distinguishing features of our method are:
(1) We make the impact for different stakeholders
explicit. The different perspectives improve the pre-
cision of the risk estimation.
(2) Our method makes use of pattern instances
based on the CVSS for describing identified threats.
The pattern format simplifies the risk estimation.
(3) We provide guidance for each step by defining
input and output and describing its execution in detail.
Since our method is semi-automatic, we reduce the
manual effort for security engineers in applying it.
Based on our method, we plan to assist security
engineers in selecting and evaluating controls. To do
so, we will adapt our method to suggest a combination
of controls that provides a sufficient risk reduction.
The selection will be based on the risk priorities and
the effort for applying a control.
Currently, we only take security for software-
based systems into account. In future work, we plan
to investigate how our method can improve the evalu-
ation of privacy and safety risks. Depending on the
context, we will elaborate whether it is possible to
combine the process for security, privacy and safety.
As mentioned in Section 5, we will develop a tool
for our method. The tool will be designed in form of
a workflow that asks the engineers for inserting the
required data, documents the results in a usable way
and finally provides a list of risks with the assigned
priority.
REFERENCES
Abeywardana, K., Pfluegel, E., and Tunnicliffe, M. (2016).
A layered defense mechanism for a social engineering
aware perimeter. pages 1054–1062.
Argyropoulos, N., Angelopoulos, K., Mouratidis, H., and
Fish, A. (2018). Risk-aware decision support with
constrained goal models. Information and Computer
Security, 26(4):472–490.
Beckers, K. (2015). Pattern and Security Requirements
- Engineering-Based Establishment of Security Stan-
dards. Springer.
Common Criteria (2017). Common Criteria for Informa-
tion Technology Security Evaluation v3.1. Release 5.
Standard.
Elahi, G., Yu, E., and Zannone, N. (2010). A vulnerability-
centric requirements engineering framework: analyz-
ing security attacks, countermeasures, and require-
ments based on vulnerabilities. Requirements Engi-
neering, 15(1):41–62.
FIRST.org (2015). Common Vulnerability Scor-
ing System v3.0: Specification Document.
https://www.first.org/cvss/cvss-v30-specification-
v1.8.pdf.
Ionita, D., Kegel, R., Baltuta, A., and Wieringa, R. (2017).
Arguesecure: Out-of-the-box security risk assess-
ment. pages 74–79.
Islam, M. M., Lautenbach, A., Sandberg, C., and Olovsson,
T. (2016). A risk assessment framework for automo-
tive embedded systems. In Proceedings of the 2Nd
ACM International Workshop on Cyber-Physical Sys-
tem Security, CPSS ’16, pages 3–14, New York, NY,
USA. ACM.
Labunets, K., Massacci, F., and Paci, F. (2017). On the
equivalence between graphical and tabular represen-
tations for security risk assessment. Lecture Notes in
Computer Science, 10153 LNCS:191–208.
Llans
´
o, T., Dwivedi, A., and Smeltzer, M. (2015). An ap-
proach for estimating cyber attack level of effort. 2015
Annual IEEE Systems Conference (SysCon) Proceed-
ings, pages 14–19.
Lund, M. S., Solhaug, B., and Stølen, K. (2010).
Model-Driven Risk Analysis. The CORAS Approach.
Springer.
Pardue, H., Landry, J., and Yasinsac, A. (2009). A risk as-
sessment model for voting systems using threat trees
and monte carlo simulation. In 2009 First Interna-
tional Workshop on Requirements Engineering for e-
Voting Systems, pages 55–60.
Rajbhandari, L. (2013). Consideration of opportunity and
human factor: Required paradigm shift for informa-
tion security risk management. In 2013 European In-
telligence and Security Informatics Conference, pages
147–150.
Saaty, T. L. (1988). What is the analytic hierarchy process?
In Mitra, G., Greenberg, H. J., Lootsma, F. A., Ri-
jkaert, M. J., and Zimmermann, H. J., editors, Mathe-
matical Models for Decision Support, pages 109–121,
Berlin, Heidelberg. Springer Berlin Heidelberg.
Stonerburner, G., Goguen, A., and Feringe, A. (2007). Risk
management guide for information technology sys-
tems, 2002 (nist special publication 800-30).
Tundis, A., M
¨
uhlh
¨
auser, M., Gallo, T., Garro, A., Sacc
´
a, D.,
Citrigno, S., and Graziano, S. (2017a). Systemic risk
analysis through se methods and techniques. volume
2010, pages 101–104. cited By 0.
Tundis, A., M
¨
uhlh
¨
auser, M., Garro, A., Gallo, T., Sacc
´
a, D.,
Citrigno, S., and Graziano, S. (2017b). Systemic risk
modeling & evaluation through simulation & bayesian
networks. volume Part F130521. cited By 0.
Wirtz, R. and Heisel, M. (2019). A systematic method to
describe and identify security threats based on func-
tional requirements. In Zemmari, A., Mosbah, M.,
Cuppens-Boulahia, N., and Cuppens, F., editors, Risks
and Security of Internet and Systems, pages 205–221,
Cham. Springer International Publishing.
ENASE 2019 - 14th International Conference on Evaluation of Novel Approaches to Software Engineering
306