Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security‿ but need to be able to justify their security investment plans. In this paper, we present a Risk-Based Requirements Prioritization method (RiskREP) that extends misuse case-based methods with IT architecture based risk assessment and countermeasure definition and prioritization. Countermeasure prioritization is linked to business goals to achieve and based on cost of countermeasures and their effectiveness in reducing risks. RiskREP offers the potential to elicit complete security countermeasures, but also supports the deliberate decision and documentation of why the security analysis is focused on certain aspects. We illustrate RiskREP by an application to an action case.
|Title of host publication||Perspectives in Business Informatics Research|
|Editors||Laila Niedrite, Renate Strazdina, Benkt Wangler|
|Place of Publication||Berlin|
|Number of pages||8|
|Publication status||Published - 6 Oct 2011|
|Name||Lecture Notes in Business Information Processing|
Herrmann, A., Morali, A., Etalle, S., & Wieringa, R. J. (2011). RiskREP: Risk-Based Security Requirements Elicitation and Prioritization. In L. Niedrite, R. Strazdina, & B. Wangler (Eds.), Perspectives in Business Informatics Research (pp. 155-162). (Lecture Notes in Business Information Processing; No. 106). Berlin: Springer.