最美情侣中文字幕电影,在线麻豆精品传媒,在线网站高清黄,久久黄色视频

歡迎光臨散文網(wǎng) 會員登陸 & 注冊

Threat Modeling(威脅建模)

2022-09-18 21:59 作者:樂琪教育  | 我要投稿

一、Definition(定義)

Threat modeling is a structured process with these objectives:?

威脅建模是一個結(jié)構(gòu)化的過程,具有以下目標。


????identify security requirements, (?確定安全要求)

????pinpoint security threats and potential vulnerabilities, (找出安全威脅和潛在的漏洞)

????quantify threat and vulnerability criticality, (量化威脅和漏洞的嚴重程度)

????and prioritize remediation methods.(并對補救方法進行優(yōu)先排序)


二、步驟

????1、分解應(yīng)用程序;

????2、確定威脅并對其排序;

????3、確定對策和緩解措施

三、Threat modeling methods and tools

CIA method

As a starting point, use the CIA (confidentiality, integrity, availability) method to define what needs protecting in the organization. For example, there may be sensitive customer information (confidentiality), company operational or proprietary data (integrity), or reliability of a service such as a web portal (availability).

Attack trees

Attack trees are a graphic representation of systems and possible vulnerabilities. The trunk of the attack tree is the asset, while entry points and threats are branches or roots. Attack trees are often combined with other methods.

STRIDE

Developed by Microsoft, STRIDE (spoofing, tampering, repudiation, information disclosure, denial of service, elevation of privilege) is one of the oldest and most widely used frameworks for threat modeling. STRIDE is a free tool that will produce DFDs and analyze threats.

PASTA

PASTA (process for attack simulation and threat analysis) is a framework designed to elevate threat modeling to the strategic level, with input from all stakeholders, not just IT or security teams. PASTA is a seven-step process that begins with defining objectives and scope. It includes vulnerability checks, weakness analysis, and attack modeling, and ends with risk and impact analysis expressed through scoring.

Trike

An open-source tool available as a spreadsheet template or stand-alone program, Trike consists of a matrix combining assets, actors, actions, and rules. When parameters and data are entered in this matrix, the program produces a score-based analysis of risks and probabilities.

VAST

VAST (visual, agile, and simple threat) modeling consists of methods and processes that can be easily scaled and adapted to any scope or part of an organization. The results produce benchmarks that can be used to make reliable comparisons and measurements of effective risk across a whole organization.

Persona non grata

This method is similar to criminal profiling in law enforcement. To anticipate attacks in more detail, brainstorming exercises are performed to create a detailed picture of a hypothetical attacker, including their psychology, motivations, goals, and capabilities.

LINDDUN

The LINDDUN framework focuses on analysis of privacy threats, based on the categories that form its acronym: linkability, identifiability, non-repudiation, detectability, disclosure of information, unawareness, and non-compliance. It uses threat trees to help users choose the relevant privacy controls to apply.


Threat Modeling(威脅建模)的評論 (共 條)

分享到微博請遵守國家法律
香港 | 梁河县| 平潭县| 清水河县| 葫芦岛市| 绥阳县| 金平| 绍兴县| 新丰县| 祁阳县| 红河县| 晋城| 克山县| 泰兴市| 济宁市| 社旗县| 红原县| 南丹县| 怀化市| 达拉特旗| 桦南县| 马关县| 绥宁县| 淮南市| 湟源县| 连平县| 呼玛县| 梅州市| 黑河市| 高州市| 威远县| 漠河县| 肇州县| 南雄市| 琼海市| 武冈市| 深水埗区| 佛冈县| 石棉县| 柯坪县| 公主岭市|