The four paths to a security decision

How security decision-making works in software engineering, requirements engineering, and system engineering

The security decision

Paths to a security decision

The security decision base

Function

Unwanted event

Security Goal

Security parameters

Indicators of Insecurity (IoIs)

This article is based on a research paper first presented at EKA conference in Magdeburg, Germany on June 23, 2022. The research is funded by the German Federal Ministry of Education and Research.

--

--

Friction generates heat — true for writing and engineering. Fluchsfriction generates writings on security engineering. Heated debates welcome! CTO@admeritia

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Sarah Fluchs

Friction generates heat — true for writing and engineering. Fluchsfriction generates writings on security engineering. Heated debates welcome! CTO@admeritia