seceng-course-exp-2012
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
seceng-course-exp-2012 [2014/07/09 09:34] – [Results] martina.degramatica@unitn.it | seceng-course-exp-2012 [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 3: | Line 3: | ||
An experiment by Katsyarina Labunets, Fabio Massacci, Federica Paci, Le Minh Sang Tran. | An experiment by Katsyarina Labunets, Fabio Massacci, Federica Paci, Le Minh Sang Tran. | ||
- | This page provides additional resources that enable replication of our work published at {{: | + | This page provides additional resources that enable replication of our work published at {{: |
===== Goals ===== | ===== Goals ===== | ||
The goal of the experiment was to evaluate and compare two types of risk-driven methods, namely, visual methods (CORAS) and textual methods (SREP) with respect to their // | The goal of the experiment was to evaluate and compare two types of risk-driven methods, namely, visual methods (CORAS) and textual methods (SREP) with respect to their // | ||
Line 36: | Line 36: | ||
the visual one in identifying security requirements. | the visual one in identifying security requirements. | ||
* // | * // | ||
- | Participants’ //overall preference// | + | Participants’ //overall preference// |
* // | * // | ||
The different number of threats and security requirements identified can be likely explained by the differences between the two methods indicated by the participants during the interviews. //Diagrams in visual method help brainstorming on the threats//, giving an overview of the possible threats, the threat scenarios and the assets, while the identification of threats in textual method is not facilitated by the use of tables as it is more difficult to link assets and threats. As suggested by the participants then, the identification of threats in textual method could be made easier if a catalog of common threats was available. | The different number of threats and security requirements identified can be likely explained by the differences between the two methods indicated by the participants during the interviews. //Diagrams in visual method help brainstorming on the threats//, giving an overview of the possible threats, the threat scenarios and the assets, while the identification of threats in textual method is not facilitated by the use of tables as it is more difficult to link assets and threats. As suggested by the participants then, the identification of threats in textual method could be made easier if a catalog of common threats was available. | ||
Line 44: | Line 44: | ||
* For privacy reasons, at the beginning of the experiment a {{: | * For privacy reasons, at the beginning of the experiment a {{: | ||
* Participants' | * Participants' | ||
+ | * | ||
+ | |||
+ | |||
+ | **Data collected during the experiment are available upon request.** | ||
| |
seceng-course-exp-2012.1404891285.txt.gz · Last modified: (external edit)