Failure Mode and Effects Analysis is a systematic and proactive technique for evaluating a process to identify where and how it might fail and to assess the relative impact of different failures, in order to identify the parts of the process that are most in need of change. FMEA analysis each item in a system, considers each possible way in which the respective item can fail, determines how each failure will affect system operation, and utilizes the results of the analysis to eliminate the root causes of failures or at least alleviate their effects.
The technique was developed and first used by reliability engineers to study problems that might arise from malfunctions of military systems during the …show more content…
Related to computers, malicious software intentionally attacks software systems to: 1) cause an unintended effect; 2) prevent an intended effect; 3) or do both. Software designers use threat modeling to better understand and repulse threats to their systems. Threat modeling provides a framework for understanding potential security threats to a system, determining risk, and establishing appropriate mitigations. As the number of threads has increased, today we have a variety of threat models, but there is no universal standard method for modelling threats to software systems. The existing models usually follow the next steps:
- software and system familiarization;
- develop rules and assumptions;
- describe threats;
- classify threats;
- identify …show more content…
The most important procedure of a threat effects analysis is to develop a system to classify and group together similar threats. There is no universal taxonomy of malicious security threats at the moment, but some useful ones have been developed. Probably the most popular taxonomy is CIA, which addresses the three key requirements in any computer-related system: confidentiality, integrity, and availability. There are several threat classification strategies that use CIA to classify the threats into groups.
Confidentiality threats attempt to obtain resources of a system that are intended to be accessed only by authorized parties. The goal of a confidentiality threat is for unauthorized entity to access secret or private information from a system. Confidentiality threats have been divided in 3 subclasses:
- Eavesdropping – refers to a system in which the privacy is invaded by an attacker that spies on a user of a system or the system to gather information about the user or about the intercommunication between the user and the system;
- Theft – refers to when the attacker also steals the information from the user or system and use it for personal