Top Banner
Solution to Exercises-9 It includes example solutions to Task 1 and 2. Task 1: For scenario 1, create security risk management model using the Security Risk-aware BPMN modelling language. Fig. 1. Asset model using the Security Risk-aware BPMN modelling language Fig. 2. Risk model using the Security Risk-aware BPMN modelling language
3

Solution to Exercises9Solution to Exercises-9 It includes example solutions to Task 1 and 2. Task 1: For scenario 1, create security risk management model using the Security Risk-aware

Apr 06, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Solution to Exercises9Solution to Exercises-9 It includes example solutions to Task 1 and 2. Task 1: For scenario 1, create security risk management model using the Security Risk-aware

Solution to Exercises-9 It includes example solutions to Task 1 and 2.

Task 1: For scenario 1, create security risk management model using the Security Risk-aware BPMN modelling language.

 Fig. 1. Asset model using the Security Risk-aware BPMN modelling language

Fig. 2. Risk model using the Security Risk-aware BPMN modelling language

Page 2: Solution to Exercises9Solution to Exercises-9 It includes example solutions to Task 1 and 2. Task 1: For scenario 1, create security risk management model using the Security Risk-aware

Fig. 3. Risk treatment model using the Security Risk-aware BPMN modelling

language

Task 2: For scenario 1, create a security risk management model using the Security Risk-aware Secure Tropos modelling language or Security Risk-oriented Misuse Cases modelling language.

 Fig. 4. Asset model using the Security Risk-oriented (Mis)use Cases

 

Page 3: Solution to Exercises9Solution to Exercises-9 It includes example solutions to Task 1 and 2. Task 1: For scenario 1, create security risk management model using the Security Risk-aware

 Fig. 5. Risk model using the Security Risk-oriented Misuse Cases

 

 Fig. 6. Risk treatment model using the Security Risk-oriented Misuse Cases