2006
DOI: 10.1007/11755593_38
|View full text |Cite
|
Sign up to set email alerts
|

eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2007
2007
2009
2009

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…The exploitation of well known vulnerabilities of DNS-based procedures is a clear way of attacking the ENUM service. A recent analysis of critical threats to ENUM may be found in [19,20]. Rossebø et al present in these works their risk assessment analysis of the ENUM service based on a methodology proposed by the European Telecommunications Standards Institute (ETSI) [5].…”
Section: Threats To the Enum Servicementioning
confidence: 99%
See 2 more Smart Citations
“…The exploitation of well known vulnerabilities of DNS-based procedures is a clear way of attacking the ENUM service. A recent analysis of critical threats to ENUM may be found in [19,20]. Rossebø et al present in these works their risk assessment analysis of the ENUM service based on a methodology proposed by the European Telecommunications Standards Institute (ETSI) [5].…”
Section: Threats To the Enum Servicementioning
confidence: 99%
“…Moreover, the DNS protocol uses clear text operations, which means that either a passive attack, such as eavesdropping, or an active attack, such as man-in-the-middle, can be carried out by unauthorized users to capture queries and responses. Although this can be considered as acceptable for the resolution of host names on Web services, an associated loss of privacy when using DNS for the resolution of ENUM queries is reported in [19,20] as a critical threat.…”
Section: Threats To the Enum Servicementioning
confidence: 99%
See 1 more Smart Citation
“…The eTVRA tool prototype was presented at the iTrust 2006 demonstration session in May, 2006 accompanied by short paper appearing in the iTrust proceedings [18]. The focus of the short paper was on presenting the eTVRA tool prototype, and as such does not provide a detailed discussion of the eTVRA method.…”
Section: Introductionmentioning
confidence: 99%
“…The Who We note that creating a 3W-tree is in conformance with the general methodology of Threat Vulnerability and Risk Assessment (TVRA) [67], which has been designed as a threat, vulnerability and risk assessment method and tool for use whilst writing standards. The purpose of using the TVRA in standardization is to be able to identify vulnerabilities and mitigate the risks and then assess the vulnerabilities that exist in the system with the countermeasures applied.…”
Section: W-treementioning
confidence: 99%