winter-schl-exp2014
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
winter-schl-exp2014 [2015/06/09 13:50] – [Supplement Materials] katsiaryna.labunets@unitn.it | winter-schl-exp2014 [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ====== Evaluating the Effect of the Catalogs Usage on Security Threats and Controls Identification (Novices) ====== | ||
- | ====== Evaluating the Effect | + | This page provides additional resources that enable replication |
+ | ===== Goals ===== | ||
The goal of the experiment is to compare the effect of using domain-general versus domain-specific catalogs of threats and security controls on security risk assessment' | The goal of the experiment is to compare the effect of using domain-general versus domain-specific catalogs of threats and security controls on security risk assessment' | ||
- | ==== Supplement Materials | + | ===== Context of the Experiment ===== |
+ | |||
+ | ==== Subjects ==== | ||
+ | The participants of the experiment were 18 MSc students from different universities in Europe participating to EIT ICT Labs, a partnership between universities, | ||
+ | |||
+ | ==== Method and Catalogue ==== | ||
+ | To conduct security risk assessment the groups used SESAR ATM Security Risk Assessment Method (SecRAM). As an instance of domain-specific catalogues we used the security catalogue developed by EUROCONTROL which come with SecRAM method. As an instance of domain-general catalogues we chose the threats and security controls catalogues of the [[https:// | ||
+ | |||
+ | **The materials related to SecRAM method and EUROCONTROL EATM catalogues are confidential.** | ||
+ | |||
+ | ==== Application Scenario ==== | ||
+ | As application scenario to be used by the participants, | ||
+ | |||
+ | {{: | ||
+ | |||
+ | ==== Task ==== | ||
+ | The experiment was conducted as part of the Winter School. The participants were given a tutorial on SESAR SecRAM method of the duration of 8 hours spanned over 2 days. The tutorial was divided into different parts. Each part consisted of 45 minutes of introduction of a couple of steps of the method, followed by 45 minutes of application of the steps and 15 minutes of presentation and discussion of the results with the expert. Once trained on the application scenario and the method, the participants had at least 6 hours in the class to revise the security risk assessment. After the application phase participants delivered their final reports documenting the conducted security risk assessment of the ROT. | ||
+ | |||
+ | ===== Measurements ===== | ||
During the experiment we distributed among participants two type of questionnaires: | During the experiment we distributed among participants two type of questionnaires: | ||
- | * Pre-task questionnaire to collect some information about participants and thier background: | + | * Pre-task questionnaire to collect some information about participants and their background: |
- | * Post-task questionnaire to collect participants' | + | * Post-task questionnaire to collect participants' |
+ | |||
+ | **Data collected during the experiment are available upon request.** |
winter-schl-exp2014.1433850619.txt.gz · Last modified: (external edit)