Title :
Threat Risk Modeling
Author :
Al-Fedaghi, Sabah ; Alrashed, Asad A.
Author_Institution :
Comput. Eng. Dept., Kuwait Univ., Safat, Kuwait
Abstract :
Application development security utilizes a list of threats that identify and organize application security classes of attack. The developed system is decomposed into relevant components and then each component is analyzed for threats. Data flow diagrams (DFDs) are typically used to graphically represent a system. In this paper we propose a flow-based model as an alternative methodology for identification and classification of threats.
Keywords :
data flow analysis; formal specification; security of data; application development security; application security classes; data flow diagrams; flow based model; threat classification; threat identification; threat risk modeling; Application software; Availability; Communication system security; Computer industry; Computer networks; Computer security; Data security; Design for disassembly; Flow graphs; Programming; application development security; data flow; threat classification;
Conference_Titel :
Communication Software and Networks, 2010. ICCSN '10. Second International Conference on
Conference_Location :
Singapore
Print_ISBN :
978-1-4244-5726-7
Electronic_ISBN :
978-1-4244-5727-4
DOI :
10.1109/ICCSN.2010.29