当前位置: X-MOL 学术IEEE Softw. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Adam Shostack on Threat Modeling
IEEE Software ( IF 3.3 ) Pub Date : 2020-11-01 , DOI: 10.1109/ms.2020.3017406
Justin Beyer

Adam Shostack, of Shostack & Associates and author of Threat Modeling: Designing for Security, discusses threat modeling, its benefits, and how to add it to an organization’s existing software process. Host Justin Beyer spoke with Shostack about asset-, threat-, and software-centric approaches; diagramming applications and introducing trust boundaries; methods such as spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege as well as the kill chain and the Elevation of Privilege card game; tooling; bug bars; privacy threats; linkability, identifiability, nonrepudiation, detectability, disclosure of information, unawareness, and noncompliance; selling threat modeling to an organization; and threat modeling for the Internet of Things. We provide summary excerpts below; to hear the full interview, visit http:// www.se-radio.net or access our archives via RSS at http://feeds.feedburner.com/ se-radio.

中文翻译:

Adam Shostack 谈威胁建模

Shostack & Associates 的 Adam Shostack 和 Threat Modeling: Designing for Security 的作者讨论了威胁建模、它的好处以及如何将其添加到组织的现有软件流程中。主持人 Justin Beyer 与 Shostack 讨论了以资产、威胁和软件为中心的方法;绘制应用程序并引入信任边界;欺骗、篡改、抵赖、信息泄露、拒绝服务、提权等方式,以及杀戮链、提权卡牌游戏;工装;错误栏;隐私威胁;可链接性、可识别性、不可否认性、可检测性、信息披露、不知情和不合规;向组织出售威胁模型;物联网的威胁建模。我们在下面提供摘要摘录;听完整的采访,
更新日期:2020-11-01
down
wechat
bug