3
Solution to Exercises-9 It includes example solutions to Task 1 and 2. Task 1: For scenario 1, create security risk management model using the Security Risk-aware BPMN modelling language. Fig. 1. Asset model using the Security Risk-aware BPMN modelling language Fig. 2. Risk model using the Security Risk-aware BPMN modelling language

Solution to Exercises9Solution to Exercises-9 It includes example solutions to Task 1 and 2. Task 1: For scenario 1, create security risk management model using the Security Risk-aware

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Solution to Exercises9Solution to Exercises-9 It includes example solutions to Task 1 and 2. Task 1: For scenario 1, create security risk management model using the Security Risk-aware

Solution to Exercises-9 It includes example solutions to Task 1 and 2.

Task 1: For scenario 1, create security risk management model using the Security Risk-aware BPMN modelling language.

 Fig. 1. Asset model using the Security Risk-aware BPMN modelling language

Fig. 2. Risk model using the Security Risk-aware BPMN modelling language

Page 2: Solution to Exercises9Solution to Exercises-9 It includes example solutions to Task 1 and 2. Task 1: For scenario 1, create security risk management model using the Security Risk-aware

Fig. 3. Risk treatment model using the Security Risk-aware BPMN modelling

language

Task 2: For scenario 1, create a security risk management model using the Security Risk-aware Secure Tropos modelling language or Security Risk-oriented Misuse Cases modelling language.

 Fig. 4. Asset model using the Security Risk-oriented (Mis)use Cases

 

Page 3: Solution to Exercises9Solution to Exercises-9 It includes example solutions to Task 1 and 2. Task 1: For scenario 1, create security risk management model using the Security Risk-aware

 Fig. 5. Risk model using the Security Risk-oriented Misuse Cases

 

 Fig. 6. Risk treatment model using the Security Risk-oriented Misuse Cases