Cybersecurity User Requirements Analysis: The ECHO Approach

Authors: Katos, V., Ki-Aries, D., Faily, S., Genchev, A., Bozhilova, M. and Stoianov, N.

Journal: Lecture Notes in Networks and Systems

Volume: 344

Pages: 405-421

eISSN: 2367-3389

ISBN: 9783030899011

ISSN: 2367-3370

DOI: 10.1007/978-3-030-89902-8_30

Abstract:

Cyber defense requires research and investment in advanced technological solution as well as in the development of effective methods and tools for identifying cyber threats and risks. This implies a need for a well-defined process for user requirements elicitation. The paper presents a structured approach for the identification of cybersecurity knowledge and elicitation of user needs, based on the development of specific use cases. Employing use cases is an effective way to identify the cyber security gaps. Example use case descriptions of the attacks on a general computer network are given. The proposed use cases are analyzed within CAIRIS platform. The modelling process confirms that CAIRIS is a powerful tool to enrich the context of threat models and UML class diagrams. Also, the modelling with CAIRIS could support using security-by-design principles. The research is conducted under the activities of “The European network of Cybersecurity centres and competence Hub for innovation and Operations” (ECHO) project.

Source: Scopus