2014
DOI: 10.1016/j.procs.2014.05.452
|View full text |Cite
|
Sign up to set email alerts
|

Classification of Security Threats in Information Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
98
0
2

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 206 publications
(100 citation statements)
references
References 8 publications
0
98
0
2
Order By: Relevance
“…The threat modelling approach in such environments needs to achieve some desired properties. It should be exclusive, exhaustive, unambiguous, repeatable, comprehensive and useful to capture the largest possibility of potential security threats [27], [28], [29]. The hybrid threat modelling is designed to overcome the limitations of existing threat modelling approaches that use only two or three criteria, and the lack of consideration of the desired properties [30], [31].…”
Section: Managing Security and Compliance Risks Of Outsourced It Projmentioning
confidence: 99%
“…The threat modelling approach in such environments needs to achieve some desired properties. It should be exclusive, exhaustive, unambiguous, repeatable, comprehensive and useful to capture the largest possibility of potential security threats [27], [28], [29]. The hybrid threat modelling is designed to overcome the limitations of existing threat modelling approaches that use only two or three criteria, and the lack of consideration of the desired properties [30], [31].…”
Section: Managing Security and Compliance Risks Of Outsourced It Projmentioning
confidence: 99%
“…Therefore, management and risk assessment need to understand and analyze threats and vulnerabilities as a crucial security issues. Thus, effective security classification is necessary to identify and organize threats and vulnerabilities into classes based on the intended effect of attacks and develop solutions to prevent system from effective threats (Jouini et al, 2014).…”
Section: Identify Threats and Vulnerabilitiesmentioning
confidence: 99%
“…In [7], a risk assessment approach from the perspective of a cloud user is presented to analyze the data security risks before putting his confidential data into a cloud computing environment. This work allows helping cloud computing users to evaluate the risk of their data security.…”
Section: Risk Analysis Model For Cloud Computing Systemmentioning
confidence: 99%
“…In this section, we propose a new cyber security metric, extension of the mean failure cost (MFC) metric, based on threats classification and especially on our proposed threat classification model [7]. We illustrate, then, this infrastructure by means of a cloud computing application.…”
Section: The Mfc Extension (Mfce) Modelmentioning
confidence: 99%
See 1 more Smart Citation