首页> 外文期刊>Requirements Engineering >A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
【24h】

A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities

机译:以漏洞为中心的需求工程框架:基于漏洞分析安全攻击,对策和需求

获取原文
获取原文并翻译 | 示例
       

摘要

Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements elicitation and analysis centered on vulnerabilities. The framework offers modeling and analysis facilities to assist system designers in analyzing vulnerabilities and their effects on the system; identifying potential attackers and analyzing their behavior for compromising the system; and identifying and analyzing the countermeasures to protect the system. The framework proposes a qualitative goal model evaluation analysis for assessing the risks of vulnerabilities exploitation and analyzing the impact of countermeasures on such risks.
机译:由于利用了系统内的漏洞,因此发生了许多安全漏洞。漏洞是需求,设计和实施中的弱点,攻击者利用这些弱点来破坏系统。本文提出了围绕漏洞的安全需求引发和分析的方法框架。该框架提供了建模和分析工具,以帮助系统设计人员分析漏洞及其对系统的影响;确定潜在的攻击者并分析其行为以破坏系统;确定并分析保护系统的对策。该框架提出了定性目标模型评估分析,以评估漏洞利用的风险并分析对策对此类风险的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号