Infrastructural Map for Information Security

نویسندگان

  • Sabah Al-Fedaghi
  • Hanaa Alnashwan
چکیده

Abstract—The threat modeling process starts with the phases of identifying critical assets, creating an architecture overview, and decomposing to identify possible points of attack. Data flow diagrams and sequence diagrams are used in this process. This paper proposes an alternative flow-based methodology for building an architectural map for the system. It provides a high-level methodology for creating a blueprint of the organization to guide security planning in the network.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Image Encryption Model Based on Hybridization of Genetic Algorithm, Chaos Theory and Lattice Map

Encryption is an important issue in information security which is usually provided using a reversible mathematical model. Digital image as a most frequently used digital product needs special encryption algorithms. This paper presents a new encryption algorithm high security for digital gray images using genetic algorithm and Lattice Map function. At the first the initial value of Logistic Map ...

متن کامل

Improving security of double random phase encoding with chaos theory using fractal images

This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...

متن کامل

Can Topic Maps describe context for enterprise-wide applications?

Topic maps provide exciting opportunities not just to make information easier to find, but to increase the usability of software. In order to provide users with the information that applies to their particular situations, in forms that they can use, software must be aware of a user’s context (in a broad, multi-dimensional sense). Topic maps can serve as the language for linking information to s...

متن کامل

Role of Intelligence Inputs in Defending against Cyber Warfare and Cyber Terrorism

This article examines the role of espionage in defending against cyber-attacks on infrastructural firms. We analyze the problem using a game between a government, an infrastructural firm and an attacker. If the attacker successfully breaches the IT security defenses of the infrastructural firm, primary losses accrue to that firm while widespread collateral losses accrue to the rest of the econo...

متن کامل

تعیین عرصه‌های حساس به لغزش با استفاده از روش ترکیبی نوین آنتروپی شانون-ارزش اطلاعات (مطالعه موردی: حوزه سرخون کارون)‌

     The landslides impose serious damages to the economy, environment and human throughout the world. Identification of areas susceptible to landslides is necessary to avoid risks. In This research for Landslide hazard zonation in sarkhoon karoon watershed have been used Shannon’s Entropy Index and Information Value Methods. For this purpose, at first, landslide locations were identified using...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011