D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
ADS-B<br />
Manage<br />
ADS-B signal<br />
ADS-B<br />
signal<br />
Apply MD5<br />
checksum<br />
r<br />
+<br />
Availability of<br />
surveillance<br />
data<br />
De<br />
Integrity of<br />
ADS-B signal<br />
Surveillance<br />
data<br />
Radar<br />
Manage<br />
ADS-B signal<br />
Manage<br />
radar signal<br />
AND<br />
Manage<br />
surveillance<br />
data<br />
ADS-B<br />
signal<br />
AND<br />
Radar<br />
signal<br />
+ +<br />
De<br />
Gather aircraft<br />
position<br />
Availability of<br />
ADS-B signal<br />
Availability of<br />
radar signal<br />
AND<br />
RDPS<br />
Availability of<br />
surveillance<br />
data<br />
Run fault<br />
tolerant<br />
MRT<br />
Figure 8. Requirement model for ADS-B Introduction<br />
Step 5 (Identify Risks): There are several risks associated with each of the<br />
behavioural premises (P1, P2 and P3). For instance, GPS signal availability may be at<br />
risk due to several forms of attack, such as ADS-B signal jamming and the ADS-B<br />
system turn off. Here the method user can adopt an appropriate risk identification<br />
technique such as the one proposed by CORAS.<br />
Step 6 (Classify Risks): ADS-B signal jamming is a risk that may be transferred to the<br />
context, whilst the ADS-B system turn off is a risk that may be transferred to the<br />
system.<br />
Step 7 (Mitigate Risks): The risk of ADS-B signal jamming may be mitigated by<br />
ensuring that there is no 1090 MHz jamming near ground stations, for instance. The<br />
risk of ADS-B system turn off may be mitigated by providing no in-flight turn off<br />
functionality.<br />
Step 8 (Prioritize Risks): Domain experts help prioritizing the risks: in this case, they<br />
are both identified as critical risks. Again, CORAS or another appropriate risk<br />
prioritization technique can be used to prioritize these risks.<br />
<strong>D.3.3</strong> Algorithms for Incremental Requirements Models<br />
Evaluation and Transformation| version 1.19 | page 19/136