Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
An Integration of Threat Modeling with Attack Pattern and Misuse Case for Effective Security Requirement Elicitation
by
Md Tarique Jamal Ansari
, Pandey, Dhirendra
in
Merchant banks
/ Reinsurance
/ Risk analysis
/ Security deposits
/ Threat models
2017
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
An Integration of Threat Modeling with Attack Pattern and Misuse Case for Effective Security Requirement Elicitation
by
Md Tarique Jamal Ansari
, Pandey, Dhirendra
in
Merchant banks
/ Reinsurance
/ Risk analysis
/ Security deposits
/ Threat models
2017
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
An Integration of Threat Modeling with Attack Pattern and Misuse Case for Effective Security Requirement Elicitation
Journal Article
An Integration of Threat Modeling with Attack Pattern and Misuse Case for Effective Security Requirement Elicitation
2017
Request Book From Autostore
and Choose the Collection Method
Overview
Today’s security is becoming a brainstorming issue due to inventive attacks. To elicit effective security requirement to the system, software developers need to think like an attacker. This paper considers three effective security requirement elicitation techniques, Threat modelling, Misuse case and Attack pattern. Threat Modeling is a technique to prevent the system from any undesired event by modeling all the information which has the potential to harm the system. It is a process for eliciting security requirement by identifying harmful threats to the system. Misuse case represents negative use cases to model threats and mis-actors to represent attackers. Misuse cases are capable of modeling threat and risk analysis process. Attack Pattern works as a method to identify the attacker’s perspective. Specifically, Threat modelling, Attack pattern and Misuse case are compared on the basis of some parameters. The comparative analysis provides some merits and demerits of these techniques. This paper investigates how misuse cases enhance the performance of threat modeling. This paper also describes an effective way for security requirement elicitation by integrating threat modeling with attack pattern and misuse cases.
Publisher
International Journal of Advanced Research in Computer Science
Subject
This website uses cookies to ensure you get the best experience on our website.