Due to the increase in professionals adopting the home office model due to the COVID-19 pandemic, the threat to company information and assets has become more evident. This work aims to identify, describe and evaluate the impacts of applying the threat modeling method, using risk management standards, on corporate computers with the aid of a monitoring system. The proposed method for application suggests the adoption of processes and a system for updating, controlling and managing the Windows Operating System to reduce the threats faced. The research identified security using the STRIDE and DREAD methods and the ISO and NIST security standards. It verified 14 types of threats found in an operating system that can be properly identified and ...
W artykule opisano zastosowanie metody modelowania zagrożeń dla potrzeb oceny poziomu bezpieczeństwa...
Purpose: Effective Security Threat modeling in an enterprise depends on the efficient tools used for...
Home Office has become a necessity nowadays, as it is part of the business continuity plan for many ...
Information security is a topic that has been increasingly discussed nowadays after the beginning of...
Threat Modeling is a vital approach to implementing ”Security by Design” because it enables the disc...
Threat modeling provides a systematic way to identify cybersecurity threats. It is an essential part...
An interconnected world with an increasing number of systems, products and services relying on the a...
Legacy enterprise applications provide unique challenges for software security personnel. The \ud si...
Legacy enterprise applications provide unique challenges for software security personnel. The \ud si...
Current threat modeling methodologies and tools are biased toward systems under development. While, ...
Software is the most important line of defense for protecting critical information assets such as in...
© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Software security has gone from not being a major concern in software development prior to the mid-1...
We routinely hear vendors claim that their systems are “secure. ” However, without knowing what assu...
The main objective of this paper is to integrate threat modeling when developing a software applicat...
W artykule opisano zastosowanie metody modelowania zagrożeń dla potrzeb oceny poziomu bezpieczeństwa...
Purpose: Effective Security Threat modeling in an enterprise depends on the efficient tools used for...
Home Office has become a necessity nowadays, as it is part of the business continuity plan for many ...
Information security is a topic that has been increasingly discussed nowadays after the beginning of...
Threat Modeling is a vital approach to implementing ”Security by Design” because it enables the disc...
Threat modeling provides a systematic way to identify cybersecurity threats. It is an essential part...
An interconnected world with an increasing number of systems, products and services relying on the a...
Legacy enterprise applications provide unique challenges for software security personnel. The \ud si...
Legacy enterprise applications provide unique challenges for software security personnel. The \ud si...
Current threat modeling methodologies and tools are biased toward systems under development. While, ...
Software is the most important line of defense for protecting critical information assets such as in...
© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Software security has gone from not being a major concern in software development prior to the mid-1...
We routinely hear vendors claim that their systems are “secure. ” However, without knowing what assu...
The main objective of this paper is to integrate threat modeling when developing a software applicat...
W artykule opisano zastosowanie metody modelowania zagrożeń dla potrzeb oceny poziomu bezpieczeństwa...
Purpose: Effective Security Threat modeling in an enterprise depends on the efficient tools used for...
Home Office has become a necessity nowadays, as it is part of the business continuity plan for many ...