@inbook{76cd81e30e514a94bcf6a31700f9ce9b,
title = "RiskREP: Risk-Based Security Requirements Elicitation and Prioritization",
abstract = "Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security‿ but need to be able to justify their security investment plans. In this paper, we present a Risk-Based Requirements Prioritization method (RiskREP) that extends misuse case-based methods with IT architecture based risk assessment and countermeasure definition and prioritization. Countermeasure prioritization is linked to business goals to achieve and based on cost of countermeasures and their effectiveness in reducing risks. RiskREP offers the potential to elicit complete security countermeasures, but also supports the deliberate decision and documentation of why the security analysis is focused on certain aspects. We illustrate RiskREP by an application to an action case.",
keywords = "METIS-278771, IR-78045, Prioritization, Elicitation, Requirements, SCS-Cybersecurity, Risk-Based, RiskREP, EWI-20462, SCS-Services, Security",
author = "Andrea Herrmann and A. Morali and Sandro Etalle and Wieringa, {Roelf J.}",
year = "2011",
month = oct,
day = "6",
language = "Undefined",
isbn = "978-9984-30-197-6",
series = "Lecture Notes in Business Information Processing",
publisher = "Springer",
number = "106",
pages = "155--162",
editor = "Laila Niedrite and Renate Strazdina and Benkt Wangler",
booktitle = "Perspectives in Business Informatics Research",
address = "Germany",
note = "1st International Workshop on Alignment of Business Process and Security Modelling, ABPSM 2011 ; Conference date: 06-10-2011 Through 08-10-2011",
}