@inproceedings{2c7fb76a9adf4dc88766650bd2c2e7fc,
title = "Extended eTVRA vs. Security Checklist: Experiences in a Value-Web",
abstract = "Security evaluation according to ISO 15408 (common criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take their products through a common criteria evaluation. To support security evaluation, the European Telecommunications Standards Institute (ETSI) has developed a threat, vulnerability, risk analysis (eTVRA) method for the Telecommunication (Telco) domain. eTVRA builds on the security risk management methodology CORAS and is structured in such a way that it provides output that can be directly fed into a common criteria security evaluation. In this paper, we evaluate the time and resource efficiency of parts of eTVRA and the quality of the result produced by following eTVRA compared to a more pragmatic approach (protection profile-based checklists). We use both approaches to identify and analyze risks of a new SIM card currently under joint development by a small hardware company and a large Telco provider.",
keywords = "SCS-Cybersecurity, Risk analysis, Internet, RISK ASSESSMENT, telecommunication security, METIS-265738, value-webs, EWI-14963, IR-65344, ISO standards, telecommunication standards",
author = "A. Morali and Emmanuele Zambon and S.H. Houmb and Karin Sallhammar and Sandro Etalle",
note = "10.1109/ICSE-COMPANION.2009.5070971 ; 31st IEEE International Conference on Software Engineering, ICSE 2009 ; Conference date: 16-05-2009 Through 24-05-2009",
year = "2009",
month = jan,
day = "26",
doi = "10.1109/ICSE-COMPANION.2009.5070971",
language = "Undefined",
isbn = "978-1-4244-3494-7",
publisher = "IEEE",
pages = "130--140",
booktitle = "31st International Conference on Software Engineering - Companion Volume",
address = "United States",
}