Table 1. Summary of established security analysis approaches other than STPA-based ones.
Brief Introduction of established security analysis approaches (other than STPA-based ones) with their categories.
| Approach | Brief introduction | Category |
|---|---|---|
| NIST cybersecurity framework method (NIST, 2018) | Cybersecurity Framework is a risk-based approach to managing cybersecurity risks of critical infrastructure published by the National Institute of Standards and Technology (NIST). Five functions of the framework core are “Identify”, “Protect”, “Detect”, “Respond”, and “Recover” | Threat-oriented; Component-based |
| EVITA TARA process (Ruddle et al., 2009) | EVITA TARA method was proposed in the E-Safety Vehicle Intrusion Protected Applications (EVITA) project, which aims to design, verify, and prototype a secure architecture for automotive on-board networks | Threat-oriented; Scenario-based |
| TVRA process (ETSI, 2017) | Threat, Vulnerabilities, and implementation Risks Analysis (TVRA) is a process-driven TARA methodology developed by the European Telecommunications Standards Institute (ETSI) | Threat-oriented; Component-based |
| OCTAVE Allegro (Caralli et al., 2007) | OCTAVE Allegro is a streamlined approach for information assets, as an agile variant of the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE), which was developed by the Software Engineering Institute and sponsored by the U.S. Department of Defense | Threat-oriented; Component-based |
| HEAVENS TARA process (Olsson, 2016) | HEAling Vulnerabilities to ENhance Software Security and Safety (HEAVENS) is a systematic approach of deriving security requirements for vehicle E/E systems, including processes and tools supporting for TARA | Threat-oriented; Scenario-based |
| FMVEA (Schmittner et al., 2014) | Failure Mode, Vulnerabilities and Effects Analysis (FMVEA) is an approach evolved from the Failure Mode and Effect Analysis (FMEA) to identify vulnerability cause-effect chains, which consists of vulnerabilities, threat agent, threat mode, threat effect, and attack probability | Threat-oriented; Component-based |
| CHASSIS (Raspotnig, Karpati & Katta, 2012) | Combined Harm Assessment of Safety and Security for Information Systems (CHASSIS) is a unified process for identifying hazardous scenarios by using UML-based models (misuse cases and sequence diagrams) | System-oriented; Scenario-based |