五月天青色头像情侣网名,国产亚洲av片在线观看18女人,黑人巨茎大战俄罗斯美女,扒下她的小内裤打屁股

歡迎光臨散文網(wǎng) 會員登陸 & 注冊

Threat Modeling(威脅建模)

2022-09-18 21:59 作者:樂琪教育  | 我要投稿

一、Definition(定義)

Threat modeling is a structured process with these objectives:?

威脅建模是一個結(jié)構(gòu)化的過程,具有以下目標。


????identify security requirements, (?確定安全要求)

????pinpoint security threats and potential vulnerabilities, (找出安全威脅和潛在的漏洞)

????quantify threat and vulnerability criticality, (量化威脅和漏洞的嚴重程度)

????and prioritize remediation methods.(并對補救方法進行優(yōu)先排序)


二、步驟

????1、分解應(yīng)用程序;

????2、確定威脅并對其排序;

????3、確定對策和緩解措施

三、Threat modeling methods and tools

CIA method

As a starting point, use the CIA (confidentiality, integrity, availability) method to define what needs protecting in the organization. For example, there may be sensitive customer information (confidentiality), company operational or proprietary data (integrity), or reliability of a service such as a web portal (availability).

Attack trees

Attack trees are a graphic representation of systems and possible vulnerabilities. The trunk of the attack tree is the asset, while entry points and threats are branches or roots. Attack trees are often combined with other methods.

STRIDE

Developed by Microsoft, STRIDE (spoofing, tampering, repudiation, information disclosure, denial of service, elevation of privilege) is one of the oldest and most widely used frameworks for threat modeling. STRIDE is a free tool that will produce DFDs and analyze threats.

PASTA

PASTA (process for attack simulation and threat analysis) is a framework designed to elevate threat modeling to the strategic level, with input from all stakeholders, not just IT or security teams. PASTA is a seven-step process that begins with defining objectives and scope. It includes vulnerability checks, weakness analysis, and attack modeling, and ends with risk and impact analysis expressed through scoring.

Trike

An open-source tool available as a spreadsheet template or stand-alone program, Trike consists of a matrix combining assets, actors, actions, and rules. When parameters and data are entered in this matrix, the program produces a score-based analysis of risks and probabilities.

VAST

VAST (visual, agile, and simple threat) modeling consists of methods and processes that can be easily scaled and adapted to any scope or part of an organization. The results produce benchmarks that can be used to make reliable comparisons and measurements of effective risk across a whole organization.

Persona non grata

This method is similar to criminal profiling in law enforcement. To anticipate attacks in more detail, brainstorming exercises are performed to create a detailed picture of a hypothetical attacker, including their psychology, motivations, goals, and capabilities.

LINDDUN

The LINDDUN framework focuses on analysis of privacy threats, based on the categories that form its acronym: linkability, identifiability, non-repudiation, detectability, disclosure of information, unawareness, and non-compliance. It uses threat trees to help users choose the relevant privacy controls to apply.


Threat Modeling(威脅建模)的評論 (共 條)

分享到微博請遵守國家法律
青田县| 丹东市| 安平县| 新巴尔虎右旗| 革吉县| 肇源县| 定南县| 都昌县| 翼城县| 辰溪县| 长垣县| 东城区| 五寨县| 栾川县| 峡江县| 郓城县| 凭祥市| 乡宁县| 新闻| 香港| 新郑市| 高平市| 晋江市| 饶河县| 宝清县| 郓城县| 宁蒗| 延川县| 华安县| 大港区| 武城县| 南丹县| 新乡县| 延寿县| 闽清县| 大洼县| 许昌市| 吉林省| 崇义县| 康马县| 马公市|