emfase
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
emfase [2016/03/03 14:12] – [Publications] fabio.massacci@unitn.it | emfase [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 38: | Line 38: | ||
===== Partners ===== | ===== Partners ===== | ||
- | University of Trento (Coordinator), | + | University of Trento (Coordinator, Italy), SINTEF, DeepBlue |
===== Project Internal Information ===== | ===== Project Internal Information ===== | ||
Line 44: | Line 44: | ||
Please check [[https:// | Please check [[https:// | ||
+ | ===== Project presentation ===== | ||
+ | {{: | ||
Line 62: | Line 63: | ||
==== Experiments ==== | ==== Experiments ==== | ||
+ | |||
+ | === Comparison of Security Risk Assessment methods === | ||
- UNITN Security Engineering course 2013-14: | - UNITN Security Engineering course 2013-14: | ||
- | * Participants: | + | * Participants: |
- | * Method: | + | * Method: |
* Case Study: SmartGrid | * Case Study: SmartGrid | ||
* Final result: excel file with threats and controls, presentations, | * Final result: excel file with threats and controls, presentations, | ||
* Feedback: questionnaire, | * Feedback: questionnaire, | ||
+ | - First International Week with Italian Post on Cyber Security in Complex Information Systems 2014 (Rome, Italy): | ||
+ | * Participants: | ||
+ | * Method: CORAS vs SESAR SECRAM (*) | ||
+ | * Case Study: Online Banking | ||
+ | * Final result: excel file with threats and controls, report | ||
+ | * Feedback: questionnaire | ||
+ | - UNITN Security Engineering course 2014-15: | ||
+ | * Participants: | ||
+ | * Method: CORAS vs SESAR SecRAM (*) | ||
+ | * Case Study: Remotely Operated Tower (ATM) (*) | ||
+ | * Final result: excel file with threats and controls, presentations, | ||
+ | * Feedback: questionnaire, | ||
+ | - UNITN Security Engineering course 2015-16: | ||
+ | * Participants: | ||
+ | * Method: CORAS vs SESAR SecRAM (*) | ||
+ | * Case Study: Unmanned Aerial System Traffic Management (UTM) | ||
+ | * Final result: excel file with threats and controls, presentations, | ||
+ | * Feedback: questionnaire, | ||
+ | |||
+ | === Effectiveness of Catalogues of Threats and Security Controls in Security Risk Assessment === | ||
- EIT Winter School 2014: | - EIT Winter School 2014: | ||
* Participants: | * Participants: | ||
Line 74: | Line 97: | ||
* Final result: excel file with requirements, | * Final result: excel file with requirements, | ||
* Feedback: questionnaire | * Feedback: questionnaire | ||
+ | - EMFASE SecRAM Evaluation Workshop | ||
+ | * Participants: | ||
+ | * Method: SESAR SecRAM (*) + [ BSI catalogue vs SECRAM catalogue (*) vs No catalogue (control group)] | ||
+ | * Case Study: Remotely Operated Tower (*) | ||
+ | * Final result: excel file with requirements, | ||
+ | * Feedback: questionnaire, | ||
+ | === An Empirical Comparison of Tabular vs. Graphical Risk Model Representations === | ||
+ | - UNITN Security Engineering course 2014-15: | ||
+ | * Participants: | ||
+ | * Representation: | ||
+ | * Scenario: Online Banking and Health Care Network | ||
+ | * Final result: responses to the online comprehensibility task | ||
+ | * Feedback: post-task questionnaire | ||
+ | - University of Oslo Model Engineering course 2014-2015: | ||
+ | * Participants: | ||
+ | * Representation: | ||
+ | * Scenario: Online Banking | ||
+ | * Final result: responses to the online comprehensibility task | ||
+ | * Feedback: post-task questionnaire | ||
+ | - PUCRS Information Systems course 2014-15: | ||
+ | * Participants: | ||
+ | * Representation: | ||
+ | * Scenario: Online Banking and Health Care Network | ||
+ | * Final result: responses to the online comprehensibility task | ||
+ | * Feedback: post-task questionnaire | ||
+ | - University of Calabria Cybersecurity professional master course - September 2015: | ||
+ | * Participants: | ||
+ | * Representation: | ||
+ | * Scenario: Online Banking and Health Care Network | ||
+ | * Final result: responses to the online comprehensibility task | ||
+ | * Feedback: post-task questionnaire | ||
+ | - UNITN Security Engineering course 2015-16: | ||
+ | * Participants: | ||
+ | * Representation: | ||
+ | * Scenario: Online Banking and Health Care Network | ||
+ | * Final result: responses to the online comprehensibility task | ||
+ | * Feedback: post-task questionnaire | ||
+ | - EMFASE - Security Risk Assessment Tutorial at SESAR Innovation Days 2015 (Bologna, Italy): | ||
+ | * Participants: | ||
+ | * Representation: | ||
+ | * Scenario: Online Banking | ||
+ | * Final result: responses to the paper-based comprehensibility task | ||
+ | * Feedback: post-task questionnaire | ||
+ | - EMFASE Online Study on Comprehensibility of Risk Models: | ||
+ | * Participants: | ||
+ | * Representation: | ||
+ | * Scenario: Online Banking | ||
+ | * Final result: responses to the online comprehensibility task | ||
+ | * Feedback: post-task questionnaire | ||
In part (*) means confidential documents are distributed | In part (*) means confidential documents are distributed | ||
===== Deliverables ===== | ===== Deliverables ===== | ||
- | - {{: | + | - {{: |
+ | - {{: | ||
+ | - {{: | ||
+ | - {{: | ||
+ | - {{: | ||
+ | - {{: | ||
+ | |||
===== Publications ===== | ===== Publications ===== | ||
- | | + | * K. Labunets, Y. Li, F. Massacci, F. Paci, M. Ragosta, B. Solhaug, K. Stølen, A. Tedeschi. **Preliminary Experiments on the Relative Comprehensibility of Tabular and Graphical Risk Models**, In //the Proceedings of 5th SESAR Innovation Days (SIDs' |
+ | * K. Labunets, F. Paci, F. Massacci. **Which Security Catalogue Is Better for Novices?** In //Proc. of EmpiRE Workshop at IEEE RE' | ||
+ | * M. de Gramatica, K. Labunets, F. Massacci, F. Paci, and A. Tedeschi. **The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals.** In //Proc. of REFSQ' | ||
+ | * K. Labunets, F. Massacci, F. Paci, M. Ragosta, B. Solhaug, K. Stølen, A. Tedeschi. **A First Empirical Evaluation Framework for Security Risk Assessment Methods in the ATM Domain**, In //the Proceedings of 4th SESAR Innovation Days (SIDs' | ||
+ | * M. Giacalone, R. Mammoliti, F. Massacci, F. Paci, R. Perugino, and C. Selli. **Security Triage: A Report of a Lean Security Requirements Methodology for Cost-Effective Security Analysis.** A short summary appears In //Proc. of EmpiRE Workshop at IEEE RE' | ||
+ | * K. Labunets, F. Paci, F. Massacci, and R. Ruprai. **An Experiment on Comparing Textual vs. Visual Industrial Methods for Security Risk Assessment.** In //Proc. of EmpiRE Workshop at IEEE RE' | ||
emfase.1457010772.txt.gz · Last modified: (external edit)