2021
DOI: 10.1016/j.jss.2021.111003
|View full text |Cite
|
Sign up to set email alerts
|

Finding security threats that matter: Two industrial case studies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Furthermore, DFDs may include trust boundaries which denote transitions of the respective trust assumptions between sections of the model [20]. The aptitude of DFDs regarding their use in threat analyses is a topic of scientific discussion and several enhancements to account for shortcomings exist [19,21]. Regarding IIoT-systems, the incapability to model physical aspects will be more specifically considered and motivates the proposal of the adapted DFD notation.…”
Section: System Modellingmentioning
confidence: 99%
See 2 more Smart Citations
“…Furthermore, DFDs may include trust boundaries which denote transitions of the respective trust assumptions between sections of the model [20]. The aptitude of DFDs regarding their use in threat analyses is a topic of scientific discussion and several enhancements to account for shortcomings exist [19,21]. Regarding IIoT-systems, the incapability to model physical aspects will be more specifically considered and motivates the proposal of the adapted DFD notation.…”
Section: System Modellingmentioning
confidence: 99%
“…Regarding IIoT-systems, the incapability to model physical aspects will be more specifically considered and motivates the proposal of the adapted DFD notation. One aspect of enhancement included in the eSTRIDE methodology will be utilized as a reference [21].…”
Section: System Modellingmentioning
confidence: 99%
See 1 more Smart Citation
“…We use the STRIDE threat categories to distinguish different type of threats. Tuma et al [37,38] noticed that expert analysis tend to be more balanced in terms of their review of different threat categories, while non-experts tend to report a high number of tampering, denial of service and information disclosure threats.…”
Section: Independentmentioning
confidence: 99%
“…Empirical evidence of threat analysis performance indicators is a crucial piece of the puzzle to improve the situation. But, past empirical studies were either inconclusive about some performance indicators [38] or have focused on measuring performance indicators irrespective of the human factors [31,37,40]. Yet measuring such human factors is pivotal to understanding how to close the security workforce gap in the future.…”
Section: Introductionmentioning
confidence: 99%