Skip to content Skip to sidebar Skip to footer

What Is Abuse Cases In Software Security

What Is Abuse Cases In Software Security. A short and sweet definition of a misuse case: While in [mcgraw 04c] abuse cases are described more as a design analysis technique than as a white box testing technique, the same technique can be used to develop innovative and effective test cases.

An example use case diagram showing possible misuse and mitigation
An example use case diagram showing possible misuse and mitigation from www.researchgate.net

Misuse cases analyse user/actor threats to the system. One way to do this is to systematically attempt to replicate incidents from the organization’s history. Its relationship to other security engineering work products is relatively simple, from a user perspective 2.

One Way To Do This Is To Systematically Attempt To Replicate Incidents From The Organization’s History.


Use cases use cases are. As we employ it, an abuse case model is considerably easier to understand than a mathematical security model. Abuse and misuse cases based on the attacker’s perspective can also be derived from security policies, attack intelligence, standards, and the organization’s top n attacks list (see [am2.5 build and maintain a top n possible attacks list]).

Its Relationship To Other Security Engineering Work Products Is Relatively Simple, From A User Perspective 2.


A misuse case is always linked with a misactor. Using abuse case models for security requirements analysis. Technique, use cases, to capture and analyze security requirements in a simple way.

While In [Mcgraw 04C] Abuse Cases Are Described More As A Design Analysis Technique Than As A White Box Testing Technique, The Same Technique Can Be Used To Develop Innovative And Effective Test Cases.


We attempt to explain briefly what misuse/abuse cases are and why applying the concept in the development stage of software requirements results in a more robust secure product. If a firm tracks the fraud and monetary costs associated with particular attacks, this information can in turn be used to prioritize the process of building attack patterns and abuse cases. Constructive activities are about design, defense, and functionality.

A Short And Sweet Definition Of A Misuse Case:


These kinds of things are represented by the black hat (offense). Abuse cases threaten use cases and serve as a support for developers to elicit. Abuse cases analyse system vulnerabilities.

A Misuse Case Describes Features The System Cannot Allow.


Touchpoints are a mix of destructive and constructive activities. It is focused on the set of actions that can cause harm. Flaws are fundamental failures in the design.

Post a Comment for "What Is Abuse Cases In Software Security"