Threat modeling for enterprise cybersecurity architecture

B Bokan, J Santos - 2022 Systems and Information Engineering …, 2022 - ieeexplore.ieee.org
The traditional threat modeling methodologies work well on a small scale, when evaluating
targets such as a data field, a software application, or a system component–but they do not …

Managing cybersecurity risk using threat based methodology for evaluation of cybersecurity architectures

B Bokan, J Santos - 2021 Systems and Information Engineering …, 2021 - ieeexplore.ieee.org
To manage limited resources available to protect against cybersecurity threats,
organizations must use risk management approach to prioritize investments in protection …

Threat modeling: from infancy to maturity

K Yskout, T Heyman, D Van Landuyt, L Sion… - Proceedings of the …, 2020 - dl.acm.org
Threat modeling involves the systematic identification and analysis of security threats in the
context of a specific system. This paper starts from an assessment of its current state of …

Developer-driven threat modeling: Lessons learned in the trenches

D Dhillon - IEEE Security & Privacy, 2011 - ieeexplore.ieee.org
This article describes EMC/s real-world experiences with threat modeling, including major
challenges encountered, lessons learned, and a description of the company's current …

[图书][B] Threat Modeling

I Tarandach, MJ Coles - 2020 - books.google.com
Threat modeling is one of the most essential--and most misunderstood--parts of the
development lifecycle. Whether you're a security practitioner or a member of a development …

The battle for New York: A case study of applied digital threat modeling at the enterprise level

R Stevens, D Votipka, EM Redmiles, C Ahern… - 27th USENIX Security …, 2018 - usenix.org
Digital security professionals use threat modeling to assess and improve the security
posture of an organization or product. However, no threat-modeling techniques have been …

[图书][B] Threat modeling: Designing for security

A Shostack - 2014 - books.google.com
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce
Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for …

Optimizing Cybersecurity Budgets with AttackSimulation

A Master, G Hamilton, JE Dietz - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Modern organizations need effective ways to assess cybersecurity risk. Successful cyber
attacks can result in data breaches, which may inflict significant loss of money, time, and …

Threat modeling tools: A taxonomy

Z Shi, K Graffi, D Starobinski… - IEEE Security & …, 2021 - ieeexplore.ieee.org
Threat Modeling Tools: A Taxonomy Page 1 THREAT MODELING TOOLS Threat Modeling
Tools A Taxonomy Zhenpeng Shi | Boston University Kalman Graffi | Honda Research Institute …

Cyber threat analysis

I Alsmadi - The NICE Cyber Security Framework: Cyber Security …, 2023 - Springer
In cyber threat analysis, knowledge of internal and external vulnerabilities related to a
particular system or organization is analyzed and matched against real-world cyberattacks …