2009 Third International Conference on Emerging Security Information, Systems and Technologies 2009
DOI: 10.1109/securware.2009.47
|View full text |Cite
|
Sign up to set email alerts
|

A Threat Analysis Methodology for Security Evaluation and Enhancement Planning

Abstract: Abstract-Threat analysis gives how potential adversaries exploit system weakness to achieve their goals. It identifies threats and defines a risk mitigation policy for a specific architecture, functionality and configuration. In a threat analysis security metrics are a challenging requirement in order to determine the status of network security performance and to further enhance it by minimizing exposure to considerable threats and vulnerabilities. In this paper the authors propose a generic methodology for th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0
1

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(12 citation statements)
references
References 8 publications
0
11
0
1
Order By: Relevance
“…(3) to execute performance measurements to better describe the gains obtained with the utilization of the cloud; (4) to evaluate the adoption of URN [17] to describe nonfunctional requirements; (5) to consider cloud security aspects in the development and deployment of business processes in the cloud; and (6) to evaluate this work following other approaches (e.g., evaluation based on threat analysis, based on the methodology presented on [33]). …”
Section: Discussionmentioning
confidence: 99%
“…(3) to execute performance measurements to better describe the gains obtained with the utilization of the cloud; (4) to evaluate the adoption of URN [17] to describe nonfunctional requirements; (5) to consider cloud security aspects in the development and deployment of business processes in the cloud; and (6) to evaluate this work following other approaches (e.g., evaluation based on threat analysis, based on the methodology presented on [33]). …”
Section: Discussionmentioning
confidence: 99%
“…Moreover, the firewall is not considered an efficient approach to fight against viruses and Trojan horses [1]. In addition to these, the immense spread of connected devices in the IoT has raised the requirement for intelligent security measures in response to the increasing demand of millions and billions of connected devices and services globally [2,50,54,80]. Furthermore, efficient security measures are required to fight against the numerous network-centric cyber interventions that are carried out by intelligent agents, such as computer worms and viruses.…”
Section: Introductionmentioning
confidence: 99%
“…The vast diffusion of connected devices in the IoT has created enormous demand for robust security in response to the growing demand of millions or perhaps billions of connected devices and services worldwide [3][4][5].…”
Section: Introductionmentioning
confidence: 99%