نتایج جستجو برای: threat

تعداد نتایج: 52909  

2005
Fredrik Vraalsen Mass Soldal Lund Tobias Mahler Xavier Parent Ketil Stølen

The paper makes two main contributions: (1) It presents experiences from using the CORAS language for security threat modelling to specify legal risk scenarios. These experiences are summarised in the form of requirements to a more expressive language providing specific support for the legal domain. (2) Its second main contribution is to present ideas towards the fulfilment of these requirement...

Journal: :Science 2015

Journal: :BMJ 2006

2013
Stefano Pagliaro Francesca Romana Alparone Laura Picconi Daniele Paolini Antonio Aquino

The research focused on Group Based Resiliency (GBR), the perception of ingroup’s ability to positively deal with contextual threats. Based on the uncertainty reduction theory, we advanced that GBR contributes to prevent negative effects of threats to the ingroup. We successfully tested a SEM in which when the ingroup is presented as resilient a contextual threat elicits a stronger perception o...

Journal: :Computers & Security 2005
George Magklaras Steven Furnell

The dangers that originate from acts of IT system misuse by legitimate users constitute a separate category of threats with well documented consequences for the integrity, privacy and availability of computer systems and networks. Amongst the various properties of malicious legitimate users one of the most notable ones is the level of his/her sophistication. Various studies indicate that user s...

Journal: :IJBDCN 2017
Taiming Zhu Yuanbo Guo Ankang Ju Jun Ma Xu An Wang

Currentintrusiondetectionsystemsaremostlyfordetectingexternalattacks,butthe“PrismDoor”and othersimilareventsindicatethatinternalstaffmaybringgreaterharmtoorganizationsininformation security.Traditional insider threatdetectionmethodsonlyconsider theaudit recordsofpersonal behaviorandfailedtocombineitwithbusinessactivities,whichmaymisstheins...

2014
Adam Shostack

This paper presents Elevation of Privilege, a game designed to draw people who are not security practitioners into the craft of threat modeling. The game uses a variety of techniques to do so in an enticing, supportive and non-threatening way. The subject of security tools for software engineering has not generally been studied carefully. This paper shares the objectives and design of the game,...

Journal: :IJHISI 2014
John C. Pendergrass Karen Heart C. Ranganathan V. N. Venkatakrishnan

Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper proposes a threat table approach to assess security threat...

2014
Daniel Costa Matthew Collins Samuel J. Perl Michael Albrethsen George Silowash Derrick Spooner

We describe our ongoing development of an insider threat indicator ontology. Our ontology is intended to serve as a standardized expression method for potential indicators of malicious insider activity, as well as a formalization of much of our team’s research on insider threat detection, prevention, and mitigation. This ontology bridges the gap between natural language descriptions of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید