2015
DOI: 10.1002/9781118988374
|View full text |Cite
|
Sign up to set email alerts
|

Risk Centric Threat Modeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
32
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 109 publications
(33 citation statements)
references
References 0 publications
0
32
0
1
Order By: Relevance
“…This approach has two main components; assets and threats. The assets taxonomy involves identifying assets, asset groups, asset types, asset details [34]. The threat taxonomy utilizes attack trees, attack graphs and assets' own failure modes in order to prioritize associated risk levels and then mapped to assets.…”
Section: Asset-centric Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach has two main components; assets and threats. The assets taxonomy involves identifying assets, asset groups, asset types, asset details [34]. The threat taxonomy utilizes attack trees, attack graphs and assets' own failure modes in order to prioritize associated risk levels and then mapped to assets.…”
Section: Asset-centric Approachmentioning
confidence: 99%
“…The threat taxonomy utilizes attack trees, attack graphs and assets' own failure modes in order to prioritize associated risk levels and then mapped to assets. Methodologies based on the asset-centric approach include PASTA, OCTAVE and STRIDE 6.2.1 PASTA PASTA (Process for Attack Simulation and Threat Analysis) is an asset-centric approach to threat modeling [34]. This methodology was developed by Minded Security and VerSprite.…”
Section: Asset-centric Approachmentioning
confidence: 99%
“…Some of the threat modeling methods also provide a guide to discover security controls that effectively remove, counter, or mitigate all relevant vulnerabilities. For example, PASTA [27] includes the countermeasure indication process. Since PASTA focuses on the software security aspect, the countermeasures are derived as a form of additional security functions.…”
Section: Security Model Design Frameworkmentioning
confidence: 99%
“…Various security approaches have been proposed to address or mitigate potential threats [16]. Established methodologies, such as STRIDE [17], first documented internally at Microsoft, involve threat identification and modelling as key activities, while others, such as PASTA [18] take a comprehensive application-oriented and risk-based perspective. While these methodologies have been successfully applied in practice, they do not offer higher-level guidelines and do not sufficiently address risks introduced at the endpoint-level of the IoT stack, considering the real-time application context and integration with industrial control systems (ICSs), such as supervisory control and data acquisition (SCADA), distributed control systems (DCS), and programmable logic controllers (PLC).…”
Section: Introductionmentioning
confidence: 99%