国产精品天干天干,亚洲毛片在线,日韩gay小鲜肉啪啪18禁,女同Gay自慰喷水

歡迎光臨散文網(wǎng) 會員登陸 & 注冊

Threat Modeling(威脅建模)

2022-09-18 21:59 作者:樂琪教育  | 我要投稿

一、Definition(定義)

Threat modeling is a structured process with these objectives:?

威脅建模是一個結(jié)構(gòu)化的過程,具有以下目標。


????identify security requirements, (?確定安全要求)

????pinpoint security threats and potential vulnerabilities, (找出安全威脅和潛在的漏洞)

????quantify threat and vulnerability criticality, (量化威脅和漏洞的嚴重程度)

????and prioritize remediation methods.(并對補救方法進行優(yōu)先排序)


二、步驟

????1、分解應(yīng)用程序;

????2、確定威脅并對其排序;

????3、確定對策和緩解措施

三、Threat modeling methods and tools

CIA method

As a starting point, use the CIA (confidentiality, integrity, availability) method to define what needs protecting in the organization. For example, there may be sensitive customer information (confidentiality), company operational or proprietary data (integrity), or reliability of a service such as a web portal (availability).

Attack trees

Attack trees are a graphic representation of systems and possible vulnerabilities. The trunk of the attack tree is the asset, while entry points and threats are branches or roots. Attack trees are often combined with other methods.

STRIDE

Developed by Microsoft, STRIDE (spoofing, tampering, repudiation, information disclosure, denial of service, elevation of privilege) is one of the oldest and most widely used frameworks for threat modeling. STRIDE is a free tool that will produce DFDs and analyze threats.

PASTA

PASTA (process for attack simulation and threat analysis) is a framework designed to elevate threat modeling to the strategic level, with input from all stakeholders, not just IT or security teams. PASTA is a seven-step process that begins with defining objectives and scope. It includes vulnerability checks, weakness analysis, and attack modeling, and ends with risk and impact analysis expressed through scoring.

Trike

An open-source tool available as a spreadsheet template or stand-alone program, Trike consists of a matrix combining assets, actors, actions, and rules. When parameters and data are entered in this matrix, the program produces a score-based analysis of risks and probabilities.

VAST

VAST (visual, agile, and simple threat) modeling consists of methods and processes that can be easily scaled and adapted to any scope or part of an organization. The results produce benchmarks that can be used to make reliable comparisons and measurements of effective risk across a whole organization.

Persona non grata

This method is similar to criminal profiling in law enforcement. To anticipate attacks in more detail, brainstorming exercises are performed to create a detailed picture of a hypothetical attacker, including their psychology, motivations, goals, and capabilities.

LINDDUN

The LINDDUN framework focuses on analysis of privacy threats, based on the categories that form its acronym: linkability, identifiability, non-repudiation, detectability, disclosure of information, unawareness, and non-compliance. It uses threat trees to help users choose the relevant privacy controls to apply.


Threat Modeling(威脅建模)的評論 (共 條)

分享到微博請遵守國家法律
虎林市| 三门峡市| 都匀市| 阳春市| 庄河市| 外汇| 通河县| 保德县| 乾安县| 新密市| 永昌县| 松阳县| 蕉岭县| 定结县| 晋江市| 仙游县| 阜平县| 临颍县| 吉林市| 遵化市| 廊坊市| 察哈| 高碑店市| 谢通门县| 青龙| 固安县| 无为县| 庄浪县| 安陆市| 吉林省| 乐至县| 新津县| 乐业县| 栾川县| 通山县| 上思县| 泊头市| 孟津县| 济宁市| 错那县| 北碚区|