Human intelligence-based security evaluation
One good approach of identifying security problems is to think with a hacker’s mind. Human intelligence is able find security problems on different abstraction levels including specification, design or implementation. Our methodology is made up of the following activities:
- Threat modeling from both the attacker and assets point of view
- Definition of security assets and their important security properties based on the CIA triad principle
- Visual representation of the various attacks using the Attack tree methodology
- Collection of possible misuse-cases
- Individual analysis of each relevant threat
- Recommendations
- Risk analysis
Advantages
- Flexible: Performs well with any IT system, embedded products, their software and hardware components
- Scalable: Can build up from some ten to a hundred evaluation steps
- Intelligent: Reveals security issues needing a human approach to be found