solution to exercises9solution to exercises-9 it includes example solutions to task 1 and 2. task 1:...
TRANSCRIPT
![Page 1: Solution to Exercises9Solution to Exercises-9 It includes example solutions to Task 1 and 2. Task 1: For scenario 1, create security risk management model using the Security Risk-aware](https://reader033.vdocuments.net/reader033/viewer/2022042116/5e93337234701e36b84af497/html5/thumbnails/1.jpg)
Solution to Exercises-9 It includes example solutions to Task 1 and 2.
Task 1: For scenario 1, create security risk management model using the Security Risk-aware BPMN modelling language.
Fig. 1. Asset model using the Security Risk-aware BPMN modelling language
Fig. 2. Risk model using the Security Risk-aware BPMN modelling language
![Page 2: Solution to Exercises9Solution to Exercises-9 It includes example solutions to Task 1 and 2. Task 1: For scenario 1, create security risk management model using the Security Risk-aware](https://reader033.vdocuments.net/reader033/viewer/2022042116/5e93337234701e36b84af497/html5/thumbnails/2.jpg)
Fig. 3. Risk treatment model using the Security Risk-aware BPMN modelling
language
Task 2: For scenario 1, create a security risk management model using the Security Risk-aware Secure Tropos modelling language or Security Risk-oriented Misuse Cases modelling language.
Fig. 4. Asset model using the Security Risk-oriented (Mis)use Cases
![Page 3: Solution to Exercises9Solution to Exercises-9 It includes example solutions to Task 1 and 2. Task 1: For scenario 1, create security risk management model using the Security Risk-aware](https://reader033.vdocuments.net/reader033/viewer/2022042116/5e93337234701e36b84af497/html5/thumbnails/3.jpg)
Fig. 5. Risk model using the Security Risk-oriented Misuse Cases
Fig. 6. Risk treatment model using the Security Risk-oriented Misuse Cases