The role of catalogues of threats and security controls in security risk assessment: An empirical study with atm professionals

Martina De Gramatica, Katsiaryna Labunets*, Fabio Massacci, Federica Paci, Alessandra Tedeschi

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Abstract

    [Context and motivation] To remedy the lack of security expertise, industrial security risk assessment methods come with catalogues of threats and security controls. [Question/problem] We investigate in both qualitative and quantitative terms whether the use of catalogues of threats and security controls has an effect on the actual and perceived effectiveness of a security risk assessment method. In particular, we assessed the effect of using domain-specific versus domain-general catalogues on the actual and perceived efficacy of a security risk assessment method conducted by non-experts and compare it with the effect of running the same method by security experts but without catalogues. [Principal ideas/results] The quantitative analysis shows that nonsecurity experts who applied the method with catalogues identified threats and controls of the same quality of security experts without catalogues. The perceived ease of use was higher when participants used method without catalogues albeit only at 10% significance level. The qualitative analysis indicates that security experts have different expectations from a catalogue than non-experts. Non-experts are mostly worried about the difficulty of navigating through the catalogue (the larger and less specific the worse it was) while expert users found it mostly useful to get a common terminology and a checklist that nothing was forgotten. [Contribution] This paper sheds light on the important features of the catalogues and discuss how they contribute into risk assessment process.

    Original languageEnglish
    Title of host publicationRequirements Engineering
    Subtitle of host publicationFoundation for Software Quality - 21st International Working Conference, REFSQ 2015, Proceedings
    EditorsSamuel A. Fricker, Kurt Schneider
    PublisherSpringer
    Pages98-114
    Number of pages17
    ISBN (Electronic)9783319161006
    DOIs
    Publication statusPublished - 2015
    Event21st International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2015 - Essen, Germany
    Duration: 23 Mar 201526 Mar 2015

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume9013
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference21st International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2015
    Country/TerritoryGermany
    CityEssen
    Period23/03/1526/03/15

    Bibliographical note

    Publisher Copyright:
    © Springer International Publishing Switzerland 2015.

    Keywords

    • Empirical study
    • MEM
    • Security risk assessment methods

    Fingerprint

    Dive into the research topics of 'The role of catalogues of threats and security controls in security risk assessment: An empirical study with atm professionals'. Together they form a unique fingerprint.

    Cite this