Risk assessment, threat modeling and security testing in SDLC

AHA Kamal, CCY Yen, GJ Hui, PS Ling - arXiv preprint arXiv …, 2020 - arxiv.org
security integrated into the process of software development as well as the related individual
roles in ensuring that this security … such as security testing, risk assessment, threat modeling …

[HTML][HTML] Systematic threat assessment and security testing of automotive over-the-air (OTA) updates

S Mahmood, HN Nguyen, SA Shaikh - Vehicular Communications, 2022 - Elsevier
… solutions, and threat modeling, including … security testing studies with a particular focus
on automotive domain. We introduce our systematic threat assessment and security testing

Risk-driven security testing using risk analysis with threat modeling approach

M Palanivel, K Selvadurai - SpringerPlus, 2014 - Springer
Security testing is a process of determining risks present in … But security testing does not
provide due importance to threat … , security testing is supported by security risk assessment in …

A threat model‐based approach to security testing

A Marback, H Do, K He… - Software: Practice and …, 2013 - Wiley Online Library
security testing with threat trees. Wang et al. 11 have proposed a threat model-driven security
testing … As stated in Section 1, we wished to assess our threat model-based security testing

Intelligent web security testing with threat assessment and client server penetration

H Gohel, P Sharma - Proceedings of International Conference on ICT for …, 2016 - Springer
security of any website you are testing. In this paper, we have implemented threat assessment
… We have also demonstrated about procedure of threat and attack testing and client server …

Automated security test generation with formal threat models

D Xu, M Tu, M Sanford, L Thomas… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
… As our focus is on threat models for security testing, we build threat models as follows.
First, we identify system functions (including assets such as data) and security goals (eg, …

5G security threat assessment in real networks

S Park, D Kim, Y Park, H Cho, D Kim, S Kwon - Sensors, 2021 - mdpi.com
… and test security threats on actual networks. This paper also differs from existing studies
by specifically presenting how to mitigate each of the security threats on an actual network. …

[PDF][PDF] Technical guide to information security testing and assessment

K Scarfone, M Souppaya, A Cody… - NIST Special Publication, 2008 - git.hsbp.org
… information security testing or assessment program, but rather … of technical security testing
and assessment with emphasis on … security assessment methodologies and technical testing

Threat assessment in the cloud environment: A quantitative approach for security pattern selection

P Anand, J Ryoo, H Kim, E Kim - … of the 10th International Conference on …, 2016 - dl.acm.org
… each threat category using a 0, 5, or 10 degree scale. Using the calculated risk factor and …
threat tolerance level, we form a threat assessment matrix and security index for each threat

[HTML][HTML] A conceptual framework for threat assessment based on organization's information security policy

JE Mbowe, I Zlotnikova, SS Msanjila… - … of Information Security, 2014 - scirp.org
… The lack of effective threat assessment frameworks at local context have promoted the …
framework for security threat assessment based on organization’s information security policy. …