Comparing risk identification techniques for safety and security requirements

  • Authors:
  • Christian Raspotnig;Andreas Opdahl

  • Affiliations:
  • Department of Information Science and Media Studies, University of Bergen, NO-5020 Bergen, Norway and Software Engineering Department, Halden Reactor Project, P.O. Box 173, NO-1751 Halden, Norway;Department of Information Science and Media Studies, University of Bergen, NO-5020 Bergen, Norway

  • Venue:
  • Journal of Systems and Software
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

When developing systems where safety and security are important aspects, these aspects have to be given special attention throughout the development, in particular in the requirements phase. There are many similar techniques within the safety and security fields, but few comparisons about what lessons that could be learnt and benefits to be gained. In this paper different techniques for identifying risk, hazard and threat of computer-supported systems are compared. This is done by assessing the techniques' ability to identify different risks in computer-supported systems in the environment where they operate. The purpose of this paper is therefore to investigate whether and how the techniques can mutually strengthen each other. The result aids practitioners in the selection and combination of techniques and researchers in focusing on gaps between the two fields. Among other things, the findings suggest that many safety techniques enforce a creative and systematic process by applying guide-words and structuring the results in worksheets, while security techniques tend to integrate system models with security models.