A threat model approach to threats and vulnerabilities in on-line social networks

C Laorden, B Sanz, G Alvarez, PG Bringas - Computational Intelligence in …, 2010 - Springer
Computational Intelligence in Security for Information Systems 2010 …, 2010Springer
Abstract On-line Social Networks (OSN) have become one of the most used Internet
services. However, as happens with every new technology, they are prone to several
security issues. Despite privacy concerns begin to emerge, there are still other dangerous
vulnerabilities that affect security and threaten organisations and users assets. In this paper,
we present the first Threat Modelling approach in Online Social Networks that intends to
identify the threats and vulnerabilities that can be exploited. Next, we define what we call the …
Abstract
On-line Social Networks (OSN) have become one of the most used Internet services. However, as happens with every new technology, they are prone to several security issues. Despite privacy concerns begin to emerge, there are still other dangerous vulnerabilities that affect security and threaten organisations and users assets. In this paper, we present the first Threat Modelling approach in Online Social Networks that intends to identify the threats and vulnerabilities that can be exploited. Next, we define what we call the Circle of Risk (CoR), a graphical definition of every security aspect involved in the threat modelling.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果