2021
DOI: 10.1016/j.heliyon.2021.e05969
|View full text |Cite
|
Sign up to set email alerts
|

A review of threat modelling approaches for APT-style attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
51
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 66 publications
(52 citation statements)
references
References 23 publications
0
51
0
1
Order By: Relevance
“…Illustrate threat landscaping, risk likelihood, and mitigation strategy SREP7 Perform Secure Requirement Review, Verification & Validation (Freq: 25) SREP7. 1 Review documentation against the objectives and needs SREP7. 2 Check the documentation against the security requirement documentation acceptance test parameters SREP7.…”
Section: B Practices For Developing Secure Software (Answer Rq2)mentioning
confidence: 99%
See 1 more Smart Citation
“…Illustrate threat landscaping, risk likelihood, and mitigation strategy SREP7 Perform Secure Requirement Review, Verification & Validation (Freq: 25) SREP7. 1 Review documentation against the objectives and needs SREP7. 2 Check the documentation against the security requirement documentation acceptance test parameters SREP7.…”
Section: B Practices For Developing Secure Software (Answer Rq2)mentioning
confidence: 99%
“…"The world in every aspect has been modernized by an immense use of software systems. Software security ensures that the CIA (Confidentiality, Integrity, and Availability) of data and services are not compromised" [1,2]. This can only be done if the security is considered during all SDLC phases [1,2].…”
Section: Introductionmentioning
confidence: 99%
“…A risk model can be defined as a quantitative depiction that identifies the threat possibilities and the impact they will have on a specific asset [43]. Threat modeling is a risk modeling component that identifies, prioritizes, monitors, and evaluates the security risks in an iterative process [43].…”
Section: Threat Modeling Approachesmentioning
confidence: 99%
“…One could employ CTI against advanced persistent threats [17], [18] and threat actors attempting long term cyber-physical malicious incursions. To that effect, authors have combined risk assessment with threat modelling to better understand these kinds of cyber-attacks [19]. Cybersecurity managers could devise strategies on how to conduct effective data poisoning attacks over long periods of time to skew algorithms and impair flexible control.…”
Section: Cyber Threat Intelligencementioning
confidence: 99%