Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria


KIPS Transactions on Computer and Communication Systems, Vol. 6, No. 3, pp. 121-134, Mar. 2017
10.3745/KTCCS.2017.6.3.121,   PDF Download:
Keywords: SDLC, Threat Modeling, Security Requirements, Traceability
Abstract

With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC(Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats .In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. Park and S. Kim, "Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria," KIPS Transactions on Computer and Communication Systems, vol. 6, no. 3, pp. 121-134, 2017. DOI: 10.3745/KTCCS.2017.6.3.121.

[ACM Style]
Jisoo Park and Seungjoo Kim. 2017. Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria. KIPS Transactions on Computer and Communication Systems, 6, 3, (2017), 121-134. DOI: 10.3745/KTCCS.2017.6.3.121.