Twitter LinkedIn

Compositional Risk Assessment

and Security Testing of Networked Systems

  • Innovations
  • CRSTIP
  • Consortium
  • Events
  • Publications
  • Deliverables
  • Contact
 
Menu
  • Innovations
  • CRSTIP
  • Consortium
  • Events
  • Publications
  • Deliverables
  • Contact
 
 
 
 
 
Seventh Framework Programme

Recent Posts

  • ETSI Guide EG203251 Available
  • Year 3 Project Deliverables now Available
  • Security Testing and Risk Assessment for Large-Scale Networked Systems using ARIS
  • A RASEN Innovation for Security Pattern and Model-Based Vulnerability Testing
  • Artefacts supporting risk based security testing

PAGES

  • Innovations
  • CRSTIP
  • Consortium
  • Events
  • Publications
  • Deliverables
  • Contact
  • ETSI Guide EG203251 Available

    The European Telecommunications Standards Institute published the ETSI Guide EG203251 Methods for Testing & Specification; Risk-based Security Assessment and Testing Methodologies. The guide provides a perspective on test-based risk assessment as well as risk-based security testing and includes major contributions from the  RASEN project. Furthermore, Guide EG203251 details the management of complexity in complex systems as well as providing a conceptual […]

    January 13, 2016 / rasen_adm / Comments Off

    Read More »
  • Year 3 Project Deliverables now Available

    The final deliverable of the RASEN project are now available for download from our project website at http://www.rasenproject.eu/deliverables/. They include the following documents: D2.3.2 – Use Case Evaluation (v2) – details the results of the final evaluation of RASEN scientific and technical results, undertaken by the project’s use case provider organizations. D3.2.3 – Techniques for Compositional […]

    January 8, 2016 / rasen_adm / Comments Off

    Read More »
  • Security Testing and Risk Assessment for Large-Scale Networked Systems using ARIS

    Current existing and conventional tools fail to support industrial needs adequately. Although requirements are very diverse there is a common set of industry generic requirements applicable to a large number of industrial software developing companies. The RASEN project is addressing those, striving to deliver a new methodology and a supportive software environment. The following video […]

    November 24, 2015 / rasen_adm / Comments Off

    Read More »
  • A RASEN Innovation for Security Pattern and Model-Based Vulnerability Testing

    The following video illustrates the PMVT innovation for security pattern and model-based vulnerability testing. More information regarding RASEN innovations is available here.

    November 22, 2015 / rasen_adm / Comments Off

    Read More »
  • Artefacts supporting risk based security testing

    Security testing is used to experimentally check software implementations with respect to their security properties and their resistance to attacks. For security testing we can distinguish functional security testing and security vulnerability testing. Functional security testing checks if the software security functions are implemented correctly and consistent with the security functional requirements. It is used […]

    November 20, 2015 / rasen_adm / Comments Off

    Read More »
  • Artefacts supporting planned security testing

    Security testing is used to experimentally check software implementations with respect to their security properties and their resistance to attacks. For security testing we can distinguish functional security testing and security vulnerability testing. Functional security testing checks if the software security functions are implemented correctly and consistent with the security functional requirements. It is used […]

    November 20, 2015 / rasen_adm / Comments Off

    Read More »
  • Security testing – Continuous risk-based testing

    Security testing is used to experimentally check software implementations with respect to their security properties and their resistance to attacks. For security testing we can distinguish functional security testing and security vulnerability testing. Functional security testing checks if the software security functions are implemented correctly and consistent with the security functional requirements. It is used […]

    November 20, 2015 / rasen_adm / Comments Off

    Read More »
  • Risk assessment – Real time assessment

    Risk assessment is the overall process of risk identification, risk estimation and risk evaluation. Risk identification is the process of finding, recognizing and describing risks. This involves identifying sources of risk, areas of impacts, events (including changes in circumstances), their causes and their potential consequences. Risk identification can involve historical data, theoretical analysis, informed and […]

    November 20, 2015 / rasen_adm / Comments Off

    Read More »
  • Risk assessment – Check list assessment

    Risk assessment is the overall process of risk identification, risk estimation and risk evaluation. Risk identification is the process of finding, recognizing and describing risks. This involves identifying sources of risk, areas of impacts, events (including changes in circumstances), their causes and their potential consequences. Risk identification can involve historical data, theoretical analysis, informed and […]

    November 20, 2015 / rasen_adm / Comments Off

    Read More »
  • Legal and compliance assessment – Systematic compliance assessment

    Legal and compliance assessment refers to the overall process employed with the objective of adhering to the requirements of laws, industry and organizational standards and codes, principles of good governance and accepted community and ethical standards.  The overall process should support, to the extent possible, the documentation of compliance. A systematic compliance assessment follows a […]

    November 20, 2015 / rasen_adm / Comments Off

    Read More »

Previous Posts

 

Recent Posts

  • ETSI Guide EG203251 Available
  • Year 3 Project Deliverables now Available
  • Security Testing and Risk Assessment for Large-Scale Networked Systems using ARIS
  • A RASEN Innovation for Security Pattern and Model-Based Vulnerability Testing
  • Artefacts supporting risk based security testing
  • Artefacts supporting planned security testing
  • Security testing – Continuous risk-based testing
  • Risk assessment – Real time assessment
  • Risk assessment – Check list assessment
  • Legal and compliance assessment – Systematic compliance assessment

Tag Cloud

Pages

  • Consortium
  • Contact
  • CRSTIP Web Tool
  • Deliverables
  • Detailed information regarding RASEN support for the key areas and levels below is available by selecting them. Supported areas have a blue background
  • Events
  • Home
  • Innovations
  • Publications
  • Statistics

Categories

  • crstipv2
    • Legal and compliance assessment
      • Ad-hoc compliance assessment
      • Check list based compliance assessment
      • Systematic and risk driven
      • Systematic compliance assessment
    • Risk assessment
      • Checklist assessment
      • Qualitative Assessment
      • Quantitative assessment
      • Real time assessment
    • Security testing
      • Continuous risk-based testing
      • Planned testing
      • Risk based testing
      • Unstructured testing
    • Tool support
      • Integrated
      • None
      • Partially Integrated
      • Stand Alone
  • News

Copyright © 2013 RASENTheme created by PWT. Powered by WordPress.org