Article ID Journal Published Year Pages File Type
459801 Journal of Systems and Software 2013 28 Pages PDF
Abstract

When developing systems where safety and security are important aspects, these aspects have to be given special attention throughout the development, in particular in the requirements phase. There are many similar techniques within the safety and security fields, but few comparisons about what lessons that could be learnt and benefits to be gained. In this paper different techniques for identifying risk, hazard and threat of computer-supported systems are compared. This is done by assessing the techniques’ ability to identify different risks in computer-supported systems in the environment where they operate. The purpose of this paper is therefore to investigate whether and how the techniques can mutually strengthen each other. The result aids practitioners in the selection and combination of techniques and researchers in focusing on gaps between the two fields. Among other things, the findings suggest that many safety techniques enforce a creative and systematic process by applying guide-words and structuring the results in worksheets, while security techniques tend to integrate system models with security models.

► From a literature review we selected both safety and security risk identification techniques. ► We established an assessment framework with dimensions from the techniques. ► A comparison of the techniques shows that they can mutually strengthen each other. ► The safety and security techniques can adopt certain characteristics from each other.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,