Accesso libero

A Construction Method for Grade Protection System Based on STRIDE Threat Modeling

INFORMAZIONI SU QUESTO ARTICOLO

Cita

Yuan, H. (2020). Research and discussion on the network security level protection 2.0 system. Information & Computer (Theoretical Edition), 32(01), 223-224. Search in Google Scholar

Wang, C. X., Jiang, L. W., Li, J. H., Guo, X. Y., Wang, W. H., & Xia, Y. Y. (2024). Design and implementation of an assessment management system based on network security level protection 2.0. Science & Technology Innovation and Application, 14(06), 28-33+37. Search in Google Scholar

Wu, Y., Deng, K. F., & Liu, B. (2018). A brief analysis of the impact of the “Cybersecurity Law” on network management. Jiangxi Communications Technology, (02), 43-45. Search in Google Scholar

Yin, Y. R., & Tang, L. (2021). “Level Protection 2.0” important information system security level protection and rectification. Information Recording Materials, 22(02), 174-175. Search in Google Scholar

Wang, G. L. (2022). On the evolution and main changes of network security level protection. Digital Communication World, (02), 91-93. Search in Google Scholar

GB/T 28448-2019. (2019). Information security technology—Assessment requirements for network security level protection [Standard]. Search in Google Scholar

GB/T 22240-2020. (2020). Information security technology—Guidelines for network security level protection grading [Standard]. Search in Google Scholar

Fu, C. L., Zhang, H., Li, F. L., et al. (2024). A threat model-based framework and tool for generating security test cases. Journal of Software, 1-31. https://doi.org/10.13328/j.cnki.jos.006973. Search in Google Scholar

Budde, C. E., Kolb, C., & Stoelinga, M. (2021). Attack trees vs. fault trees: Two sides of the same coin from different currencies. In Proc. of the 18th Int’l Conf. on Quantitative Evaluation of Systems (pp. 457-467). Paris: Springer. https://doi.org/10.1007/978-3-030-85172-9_24. Search in Google Scholar

Shostack, A. (2014). Threat modeling: Designing for security. John Wiley & Sons. Search in Google Scholar

Howard, M., & Lipner, S. (2008). The security development lifecycle. (Z. X. Li, Trans.). Beijing: Publishing House of Electronics Industry. Search in Google Scholar

Wüchner, T., Ochoa, M., & Pretschner, A. (2014). Malware detection with quantitative data flow graphs. In Proc. of the 9th ACM Symposium on Information, Computer and Communications Security (pp. 271-282). New York: ACM Press. Search in Google Scholar

eISSN:
2444-8656
Lingua:
Inglese
Frequenza di pubblicazione:
Volume Open
Argomenti della rivista:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics