Accès libre

A Construction Method for Grade Protection System Based on STRIDE Threat Modeling

À propos de cet article

Citez

Yuan, H. (2020). Research and discussion on the network security level protection 2.0 system. Information & Computer (Theoretical Edition), 32(01), 223-224. Search in Google Scholar

Wang, C. X., Jiang, L. W., Li, J. H., Guo, X. Y., Wang, W. H., & Xia, Y. Y. (2024). Design and implementation of an assessment management system based on network security level protection 2.0. Science & Technology Innovation and Application, 14(06), 28-33+37. Search in Google Scholar

Wu, Y., Deng, K. F., & Liu, B. (2018). A brief analysis of the impact of the “Cybersecurity Law” on network management. Jiangxi Communications Technology, (02), 43-45. Search in Google Scholar

Yin, Y. R., & Tang, L. (2021). “Level Protection 2.0” important information system security level protection and rectification. Information Recording Materials, 22(02), 174-175. Search in Google Scholar

Wang, G. L. (2022). On the evolution and main changes of network security level protection. Digital Communication World, (02), 91-93. Search in Google Scholar

GB/T 28448-2019. (2019). Information security technology—Assessment requirements for network security level protection [Standard]. Search in Google Scholar

GB/T 22240-2020. (2020). Information security technology—Guidelines for network security level protection grading [Standard]. Search in Google Scholar

Fu, C. L., Zhang, H., Li, F. L., et al. (2024). A threat model-based framework and tool for generating security test cases. Journal of Software, 1-31. https://doi.org/10.13328/j.cnki.jos.006973. Search in Google Scholar

Budde, C. E., Kolb, C., & Stoelinga, M. (2021). Attack trees vs. fault trees: Two sides of the same coin from different currencies. In Proc. of the 18th Int’l Conf. on Quantitative Evaluation of Systems (pp. 457-467). Paris: Springer. https://doi.org/10.1007/978-3-030-85172-9_24. Search in Google Scholar

Shostack, A. (2014). Threat modeling: Designing for security. John Wiley & Sons. Search in Google Scholar

Howard, M., & Lipner, S. (2008). The security development lifecycle. (Z. X. Li, Trans.). Beijing: Publishing House of Electronics Industry. Search in Google Scholar

Wüchner, T., Ochoa, M., & Pretschner, A. (2014). Malware detection with quantitative data flow graphs. In Proc. of the 9th ACM Symposium on Information, Computer and Communications Security (pp. 271-282). New York: ACM Press. Search in Google Scholar

eISSN:
2444-8656
Langue:
Anglais
Périodicité:
Volume Open
Sujets de la revue:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics