RiskREP : risk-based security requirements elicitation and prioritization

A. Herrmann, A. Morali, S. Etalle, R.J. Wieringa

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review


Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement "good-enough security" but need to be able to justify their security investment plans. In this paper, we present a Risk-Based Requirements Prioritization method (RiskREP) that extends misuse case-based methods with IT architecturebased risk assessment and countermeasure definition and prioritization. Countermeasure prioritization is linked to business goals to achieve and based on cost of countermeasures and their effectiveness in reducing risks. RiskREP offers the potential to elicit complete security countermeasures, but also supports the deliberate decision and documentation of why the security analysis is focused on certain aspects. We illustrate RiskREP by an application to an action case.
Original languageEnglish
Title of host publicationProceedings of the The First International Workshop on Alignment of Business Process and Security Modelling (ABPSM’11, Riga, Latvia, October 6-8, 2011)
Place of PublicationRiga
PublisherRiga Technical University
ISBN (Print)978-9984-30-197-6
Publication statusPublished - 2011


Dive into the research topics of 'RiskREP : risk-based security requirements elicitation and prioritization'. Together they form a unique fingerprint.

Cite this