위협 모델링 도구의 사용성 평가기준 도출

Vol. 34, No. 4, pp. 763-780, 8월. 2024
10.13089/JKIISC.2024.34.4.763, Full Text:
Keywords: Threat modeling, Automated Threat Modeling Tools, Usable Security
Abstract

As the domestic and international landscape undergoes rapid changes, the importance of implementing security measures in response to the growing threats that businesses face is increasing. In this context, the need for Security by Design (SbD), integrating security from the early design stages, is becoming more pronounced, with threat modeling recognized as a fundamental tool of SbD. Particularly, to save costs and time by detecting and resolving security issues early, the application of the Shift Left strategy requires the involvement of personnel with limited security expertise, such as software developers, in threat modeling. Although various automated threat modeling tools have been released, their lack of user-friendliness for personnel lacking security expertise poses challenges in conducting threat modeling effectively. To address this, we conducted an analysis of research related to threat modeling tools and derived usability evaluation criteria based on the GQM(Goal-Question-Metric) approach. An expert survey was conducted to validate both the validity and objectivity of the derived criteria. We performed usability evaluations of three threat modeling tools (MS TMT, SPARTA, PyTM), and the evaluation results led to the conclusion that MS TMT exhibited superior usability compared to other tools. This study aims to contribute to the creation of an environment where personnel with limited security expertise can effectively conduct threat modeling by proposing usability evaluation criteria.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
황인노, 김승주, 조현석, 신영섭, "위협 모델링 도구의 사용성 평가기준 도출," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 4, pp. 763-780, 2024. DOI: 10.13089/JKIISC.2024.34.4.763.

[ACM Style]
황인노, 김승주, 조현석, and 신영섭. 2024. 위협 모델링 도구의 사용성 평가기준 도출. Journal of The Korea Institute of Information Security and Cryptology, 34, 4, (2024), 763-780. DOI: 10.13089/JKIISC.2024.34.4.763.