23.02.2015 Views

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ADS-B<br />

Manage<br />

ADS-B signal<br />

ADS-B<br />

signal<br />

Apply MD5<br />

checksum<br />

r<br />

+<br />

Availability of<br />

surveillance<br />

data<br />

De<br />

Integrity of<br />

ADS-B signal<br />

Surveillance<br />

data<br />

Radar<br />

Manage<br />

ADS-B signal<br />

Manage<br />

radar signal<br />

AND<br />

Manage<br />

surveillance<br />

data<br />

ADS-B<br />

signal<br />

AND<br />

Radar<br />

signal<br />

+ +<br />

De<br />

Gather aircraft<br />

position<br />

Availability of<br />

ADS-B signal<br />

Availability of<br />

radar signal<br />

AND<br />

RDPS<br />

Availability of<br />

surveillance<br />

data<br />

Run fault<br />

tolerant<br />

MRT<br />

Figure 8. Requirement model for ADS-B Introduction<br />

Step 5 (Identify Risks): There are several risks associated with each of the<br />

behavioural premises (P1, P2 and P3). For instance, GPS signal availability may be at<br />

risk due to several forms of attack, such as ADS-B signal jamming and the ADS-B<br />

system turn off. Here the method user can adopt an appropriate risk identification<br />

technique such as the one proposed by CORAS.<br />

Step 6 (Classify Risks): ADS-B signal jamming is a risk that may be transferred to the<br />

context, whilst the ADS-B system turn off is a risk that may be transferred to the<br />

system.<br />

Step 7 (Mitigate Risks): The risk of ADS-B signal jamming may be mitigated by<br />

ensuring that there is no 1090 MHz jamming near ground stations, for instance. The<br />

risk of ADS-B system turn off may be mitigated by providing no in-flight turn off<br />

functionality.<br />

Step 8 (Prioritize Risks): Domain experts help prioritizing the risks: in this case, they<br />

are both identified as critical risks. Again, CORAS or another appropriate risk<br />

prioritization technique can be used to prioritize these risks.<br />

<strong>D.3.3</strong> Algorithms for Incremental Requirements Models<br />

Evaluation and Transformation| version 1.19 | page 19/136

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!