【24h】

Threat Agents: a Necessary Component of Threat Analysis

机译:威胁因素:威胁分析的必要组成部分

获取原文
获取原文并翻译 | 示例

摘要

There have been significant achievements in defining and developing viable approaches to threat modeling and risk assessment techniques for a wide range of IT applications and computing environments. Most of the approaches have been qualitative, due to the difficulties in quantifying all the aspects of the threat analysis. Some quantitative approaches, especially based on the analysis of the cost of security, have been proposed as well, such as "Total Cost of Security" described in [1]. The adjacent field of requirements engineering that provides useful insight into threats and mitigations, has flourished also [2]. In qualitative studies, the focus was on introducing new taxonomies and ontologies [3], applying threat modeling techniques to new areas [4], e.g., ad-hoc networks or improving prioritization and usability of the existing approaches, such as the Common Vulnerability Scoring System [5]. Interest in applying the same models to hardware and software threat analysis is beginning to emerge [6], although the difficulties as well as the benefits of this approach are self-evident.
机译:在为各种IT应用程序和计算环境定义和开发可行的威胁建模和风险评估技术方法方面,已经取得了重大成就。由于难以量化威胁分析的所有方面,因此大多数方法都是定性的。还提出了一些定量方法,尤其是基于安全成本分析的定量方法,例如[1]中描述的“安全总成本”。提供对威胁和缓解的有用见解的需求工程的相邻领域也蓬勃发展[2]。在定性研究中,重点是引入新的分类法和本体论[3],将威胁建模技术应用于新领域[4],例如自组织网络,或改善现有方法的优先级和可用性,例如常见漏洞评分系统[5]。将这种模型应用于硬件和软件威胁分析的兴趣开始出现[6],尽管这种方法的困难和好处是不言而喻的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号