{"id":26,"date":"2019-09-18T21:58:10","date_gmt":"2019-09-18T21:58:10","guid":{"rendered":"http:\/\/prosaweb.duckdns.org\/?page_id=26"},"modified":"2021-11-30T08:56:09","modified_gmt":"2021-11-30T08:56:09","slug":"our-product","status":"publish","type":"page","link":"https:\/\/prosasecurity.com\/index.php\/our-product\/","title":{"rendered":"Our product"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"26\" class=\"elementor elementor-26\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-37216e34 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"37216e34\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-28513d6c\" data-id=\"28513d6c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-665871e elementor-widget elementor-widget-heading\" data-id=\"665871e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The PROSA tool and approach<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dee9a81 elementor-widget elementor-widget-text-editor\" data-id=\"dee9a81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>PROSA offers a tool that can be used for evaluating the security of software solutions. This can be used as part of security evaluations, but also for developer support. Modern solutions can have dozens or even hundreds\u00a0of different servers and protocols in use, which can be impossible for humans to keep sufficiently secure. With the PROSA suite of tools, we can help you both during the development process and with evaluators: We can help you show that your solution is truly secure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5e922e5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5e922e5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9c56b5f\" data-id=\"9c56b5f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cfa8e88 elementor-widget elementor-widget-image\" data-id=\"cfa8e88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"280\" height=\"180\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/prosa-security-architect-280x180.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-image-64\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-57959b9\" data-id=\"57959b9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-29c0387 elementor-widget elementor-widget-heading\" data-id=\"29c0387\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The PROSA security architect<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7bb4c17 elementor-widget elementor-widget-text-editor\" data-id=\"7bb4c17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The PROSA security is a tool for supporting the software engineering process of designing security solutions &#8211; potentially very large and complex solutions. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-12b3599 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"12b3599\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d337573\" data-id=\"d337573\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e5a704b elementor-widget elementor-widget-image\" data-id=\"e5a704b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"280\" height=\"180\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/adding-an-attack-280x180.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-image-63\" alt=\"\" srcset=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/adding-an-attack-280x180.png 280w, https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/adding-an-attack-1536x995.png 1536w, https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/adding-an-attack.png 1600w\" sizes=\"(max-width: 280px) 100vw, 280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8d256c4\" data-id=\"8d256c4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-77446b7 elementor-widget elementor-widget-heading\" data-id=\"77446b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Adding an attack<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bee3c7f elementor-widget elementor-widget-text-editor\" data-id=\"bee3c7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The tool contains a module that can support the generation of attacks to the design, both automatically and semi-automatic. Passive attacks pattern of arbitrary locations can be generated on single or multiple locations. Active attacks are visualised in the tool similar to the honest (normal) specifications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0722371 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0722371\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3c6a20d\" data-id=\"3c6a20d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db89a97 elementor-widget elementor-widget-image\" data-id=\"db89a97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"280\" height=\"180\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/sequence-daigram-280x180.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-image-61\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ac596fa\" data-id=\"ac596fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15b7163 elementor-widget elementor-widget-heading\" data-id=\"15b7163\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Protection graphs<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52b63a6 elementor-widget elementor-widget-text-editor\" data-id=\"52b63a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The protection graph is analysing a complete specification in order to detect all the protection-relations between cryptographic and non-cryptographic assets in the model. Protection graphs also induce an asset hierarchy: starting with the primary assets, then secondary assets &#8211; protecting primary assets etc. Protection\u00a0graphs reveal the inner details of the security design and can reveal several types of design flaws; vicious circles, unprotected cryptographic\u00a0keys.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-daa112a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"daa112a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0ae02b3\" data-id=\"0ae02b3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c8a329f elementor-widget elementor-widget-image\" data-id=\"c8a329f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"280\" height=\"180\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/example-sequence-diagram-280x180.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-image-62\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-753b211\" data-id=\"753b211\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-644638c elementor-widget elementor-widget-heading\" data-id=\"644638c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Example sequence diagram<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-225581a elementor-widget elementor-widget-text-editor\" data-id=\"225581a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Specifications in PROSA are written in a domain-specific language called ROSA, which instantaneously translates\u00a0the symbolic specification into a graphical visualization of the corresponding interaction diagram. This makes it easy and convenient for the user to be able to intuitively grasp the behaviour of the specification while writing &#8211; not afterwards.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-48f08c6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"48f08c6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-14f7d72\" data-id=\"14f7d72\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d92e8ed elementor-widget elementor-widget-image\" data-id=\"d92e8ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"280\" height=\"180\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/goals-view-280x180.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-image-60\" alt=\"\" srcset=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/goals-view-280x180.png 280w, https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/goals-view.png 1030w\" sizes=\"(max-width: 280px) 100vw, 280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-da8835b\" data-id=\"da8835b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b0343b elementor-widget elementor-widget-heading\" data-id=\"5b0343b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Goals view<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1849867 elementor-widget elementor-widget-text-editor\" data-id=\"1849867\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The goals view introduces means for specification of security requirements: in particular confidentiality goals and integrity goals. The tool provides a module for automated validation of security goals, by automatically deriving model-generated goals. Deviations between User goals and the generated goals are shown to the User &#8211; that should solve these mismatches.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The PROSA tool and approach PROSA offers a tool that can be used for evaluating the security of software solutions. This can be used as part of security evaluations, but also for developer support. Modern solutions can have dozens or even hundreds\u00a0of different servers and protocols in use, which can be impossible for humans to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-26","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/comments?post=26"}],"version-history":[{"count":30,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/26\/revisions"}],"predecessor-version":[{"id":466,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/26\/revisions\/466"}],"wp:attachment":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/media?parent=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}