A Method for Developing Abuse Cases and Its Evaluation
نویسندگان
چکیده
To develop secure software, software engineers need to have the mindset of attackers. Developing abuse cases can help software engineers to think more like attackers. This paper describes a method for developing abuse cases based on threat modeling, attack patterns, and Common Weakness Enumeration. The method also includes ranking the abuse cases according to their risks. This method intends to help non-experts create abuse cases following a specific process, and leveraging the knowledge bases of threat modeling, attack patterns, and Common Weakness Enumeration. The proposed method was evaluated through two evaluation studies conducted in two secure software engineering courses at two different universities. Evaluation studies show that the proposed method was easier to follow by non-experts in generating abuse cases than brainstorming, and could reduce the time needed for creating abuse cases. Other findings from the evaluation studies are also discussed in the paper.
منابع مشابه
فراوانی و عوامل خطر مرتبط با کودکآزاری در مراجعان به مراکز بهداشتی- درمانی شهری بندرعباس
Objectives : The aim of this study was to investigate the frequency of child abuse and its related risk factors in clients referred to urban healthcare centers in Bandar-Abbas, Iran. Method: The study was conducted in healthcare centers and urban bases of Bandar-Abbas. The centers’ staffs in this stage of the project identified the cases of child abuse. All the staffs participated in the work...
متن کاملBiochemical Markers of Acute and Chronic Ethanol Use: Forensic and Clinical Applications
Background: The analysis of ethanol in bio-samples is an important method for determination of acute alcohol use/abuse both in clinical and forensic toxicology. In forensic cases, it is known that micro-organisms involved in the postmortem putrefaction process can produce alcohol and when the body has been traumatized. In clinical setting, post-ingestion time has a critical role for determinati...
متن کاملDeveloping Abuse Cases Based on Threat Modeling and Attack Patterns
Developing abuse cases help software engineers to think from the perspective of attackers, and therefore allow them to decide and document how the software should react to illegitimate use. This paper describes a method for developing abuse cases based on threat modeling and attack patterns. First potential threats are analyzed by following Microsoft’s threat modeling process. Based on the iden...
متن کاملEvaluation of Oral Health Related behavior and and it’s preventing Factors for Dental Services in Patients with History of Drug Abuse Attending Drug Treatment Centers in Sari in 2018
Abstract BACKGROUNackground and AIMD & AIM: The purpose of this study was to evaluate the referral rate for dental services and it's preventing Factors and oral Health related behavior in people with history of drug abuse referred to drug rehabilitation centers in the city of Sari. Material & methods: This was a cross-sectional study. 120 people with history of drug abuse referred to drug...
متن کاملEffective Factors of Child Abuse within Family
Aim(s): Child abuse is a common crime and it is caused by multiple individual and environmental factors that are combined. It increases the likelihood of this type of social harm. The aim of this study was to investigate the effective factors of child abuse within family. Participants & Methods: In this study, qualitative method and in-depth interviews with experts were used and by analyzing t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JSW
دوره 11 شماره
صفحات -
تاریخ انتشار 2016