Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published December 10, 2022 | Version v1
Conference paper Open

Cyber Security Threat Modelling:Classical Approaches Survey – An Insight

  • 1. UTAS

Description

Threat modeling provides a systematic way to identify cybersecurity threats. It is an essential part of the Cybersecurity Risk Management Process. It defines countermeasures to prevent or mitigate the effects of threats to the system. Every software system today faces a range of threats, and it is increasing constantly as technology rapidly changes. Increasing use of mobiles and IoT devices also increases the threat landscape. Threats can emanate from inside/outside of organizations, and their impact has the potential to be devastating. Systems could be stopped from working entirely or sensitive information could be leaked, which would impact consumer faith. To avoid threats from taking benefit of system flaws, threat modeling methods can be used to think defensively. Though there are numerous types of frameworks for security architectures available, not a single framework is complete and totally secure. In this paper we analyzed some of the commonly used thereat modelling approaches.

Files

Threat-Modelling-Classical-Approaches-An Insight-Naveen.pdf

Files (684.7 kB)