Cargando…
A review of threat modelling approaches for APT-style attacks
Threats are potential events, intentional or not, that compromise the confidentiality, integrity, and/or availability of information systems. Defending against threats and attacks requires actionable threat intelligence. Using this intelligence to minimise risk, requires a systematic methodology or...
Autores principales: | Tatam, Matt, Shanmugam, Bharanidharan, Azam, Sami, Kannoorpatti, Krishnan |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7814160/ https://www.ncbi.nlm.nih.gov/pubmed/33506133 http://dx.doi.org/10.1016/j.heliyon.2021.e05969 |
Ejemplares similares
-
APT Attack Detection Scheme Based on CK Sketch and DNS Traffic
por: Xue, Defan, et al.
Publicado: (2023) -
Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework
por: Jabar, Thulfiqar, et al.
Publicado: (2022) -
Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach
por: Abbas, Syed Ghazanfar, et al.
Publicado: (2021) -
Risk centric threat modeling: process for attack simulation and threat analysis
por: Uceda Vélez, Tony, et al.
Publicado: (2015) -
Threat Modeling—How to Visualize Attacks on IOTA?
por: Ullah, Ikram, et al.
Publicado: (2021)