2011 IEEE 13th Conference on Commerce and Enterprise Computing 2011
DOI: 10.1109/cec.2011.13
|View full text |Cite
|
Sign up to set email alerts
|

Computer Aided Threat Identification

Abstract: Abstract-Recently, there has been an increase of reported security threats hitting organizations. Some of them are originated from the assignments to users of inappropriate permissions on organizational sensitive data. Thus it is crucial for organizations to recognize as early as possible the risks deriving by inappropriate access right management and to identify the solutions that they need to prevent such risks.In this paper, we propose a framework to identify threats during the requirements analysis of orga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 13 publications
(22 reference statements)
0
7
0
Order By: Relevance
“…During the security requirements analysis in each layer, related threat information is required to in order to identify critical security requirements. Such threat analysis was not accommodated by the framework, instead we proposed to incorporate external threat analysis approaches for this purpose (e.g., [12]) or to import corresponding threat information from related studies that have been performed in the same domain (e.g., [18]). However, existing threat analysis approaches cannot holistically analyze multistage attacks on STSs.…”
Section: A a Three-layer Security Requirements Analysis Frameworkmentioning
confidence: 99%
“…During the security requirements analysis in each layer, related threat information is required to in order to identify critical security requirements. Such threat analysis was not accommodated by the framework, instead we proposed to incorporate external threat analysis approaches for this purpose (e.g., [12]) or to import corresponding threat information from related studies that have been performed in the same domain (e.g., [18]). However, existing threat analysis approaches cannot holistically analyze multistage attacks on STSs.…”
Section: A a Three-layer Security Requirements Analysis Frameworkmentioning
confidence: 99%
“…As in [3], we distinguish three types of permission: access, modify, and manage. Each type of permission determines the set of actions that an actor can perform.…”
Section: Requirements Modelingmentioning
confidence: 99%
“…In particular, resources linked to a subgoal are needed for the achievement of the upper level goals. 3 If a (sub)goal is delegated to another actors, the corresponding goal model rooted in the rationale of the delegator is analyzed as described above. Thus, the set of resources needed to achieve a goal includes all resources needed for the achievement of its subgoals possibly via delegation.…”
Section: Mapping Between Access Control Policy and Dependence Networkmentioning
confidence: 99%
“…The final considered approach is the security threats identification as done in [2]. This approach is focused on resources and goals as assets of an organization.…”
Section: Amentioning
confidence: 99%
“…New security challenges imposed by these technological advancement can be identified through a number of existing alternatives basing on different parameters. Application security challenges can be identified by either focusing on resources and goals as assets of an organization [2], use of graphical approach such as Unified Modeling Language [3], or use of models such as STRIDE [4]. For the purposes of this paper STRIDE threats model has been selected to identify possible security threats for the anticipated Livestock Data Center system.…”
Section: Introductionmentioning
confidence: 99%