首页    期刊浏览 2025年07月14日 星期一
登录注册

文章基本信息

  • 标题:A Review of Asset-Centric Threat Modelling Approaches
  • 本地全文:下载
  • 作者:Livinus Obiora Nweke ; Stephen D. Wolthusen
  • 期刊名称:International Journal of Advanced Computer Science and Applications(IJACSA)
  • 印刷版ISSN:2158-107X
  • 电子版ISSN:2156-5570
  • 出版年度:2020
  • 卷号:11
  • 期号:2
  • DOI:10.14569/IJACSA.2020.0110201
  • 出版社:Science and Information Society (SAI)
  • 摘要:The threat landscape is constantly evolving. As attackers continue to evolve and seek better methods of compro-mising a system; in the same way, defenders continue to evolve and seek better methods of protecting a system. Threats are events that could cause harm to the confidentiality, integrity, or availability of information systems, through unauthorized disclosure, misuse, alteration, or destruction of information or information system. The process of developing and applying a representation of those threats, to understand the possibility of the threats being realized is referred to as threat modelling. Threat modelling approaches provide defenders with a tool to characterize potential threats systematically. They include the prioritization of threats and mitigation based on probabilities of the threats being realized, the business impacts and the cost of countermeasures. In this paper, we provide a review of asset-centric threat modelling approaches. These are threat modelling techniques that focus on the assets of the system being threat modelled. First, we discuss the most widely used asset-centric threat modelling approaches. Then, we present a gap analysis of these methods. Finally, we examine the features of asset-centric threat modelling approaches with a discussion on their similarities and differences.
  • 关键词:Threat modelling; asset-centric; asset-centric threat modelling approaches
国家哲学社会科学文献中心版权所有