Study on Minimum Security Requirement Using Risk Priority Number(SFRPN) for Secure Smart Factory
نویسندگان
چکیده
منابع مشابه
Smart Grid Information Security (IS) Functional Requirement
It is important to implement safe smart grid environment to enhance people's lives and livelihoods. This paper provides information on smart grid IS functional requirement by illustrating some discussion points to the sixteen identified requirements. This paper introduces the smart grid potential hazards that can be referred as a triggering factor to improve the system and security of the entir...
متن کاملPattern Based Security Requirement Derivation with Security Risk-aware Secure Tropos
Information systems (IS’s) support a multitude of functions vital to the modern society. IS’s carry an ever increasing volume of data and information, including personal pictures, health data or financial transactions. Continuously increasing rates of cyber-attacks have led to the subsequent need to rapidly develop secure IS. To develop secure IS’s, security goals need to be identified and fulf...
متن کاملAn Efficient Risk Analysis based Risk Priority in Requirement Engineering using Modified Goal Risk Model
Risk analysis is traditionally considered a critical activity for the whole software system‟s lifecycle. Risks are identified by considering technical aspects (e.g., failures of the system, unavailability of services, etc.) and handled by suitable countermeasures through a refined design. A modified Tropos goal model was developed in which the evidence of satisfaction and denial of the goal is ...
متن کاملRequirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard
Computer Security is one of today’s hot topic and the need for conceptual models of security features have brought up a number of proposals ranging from UML extensions to novel conceptual models. What is still missing, however, are models that focus on high-level security requirements, without forcing the modeler to immediately get down to security mechanisms. The modeling process itself should...
متن کاملImplement Security using smart card on Cloud
Cloud is a concept of accessing the data from their own datacenters such that the chances of eavesdropping have been reduced and storage cost is reduced. Here in this paper we are giving a brief survey of various cloud based technique implemented so far. Although there are various techniques implemented so far for the cloud computing but here we are giving a survey of not only cloud based techn...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2016
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2016.26.5.1323