(1) Understanding of the applications or asset’s
structure and how elements interact with each other,
(2) Threat identification in this context, (3) Threat
analysis, regarding its severity and impact in the
established context, (4) Definition of
countermeasures. Some authors consider risk
calculation based on likelihood, others include
technological elements to support threat
identification, such as honeytokens, for unknown
threats mapping based in real attack situations.
RQ03 allowed the study to confirm that TM is
directly relate to risk management, as the integration
between TM steps and ISO 27005 phases, although
few of the papers includes likelihood factor in TM
exercise. As R04 pointed for future research should
consider having full integration between TM and risk
management, enabling appropriate risk mapping and
mitigation control of the identified threats and their
related risks.
REFERENCES
Abi-Antoun, M., 2010, STRIDE-based security model in
Acme: p. 16.
Abi-Antoun, M., Wang, D., and Torr, P., 2007, Checking
threat modeling data flow diagrams for implementation
conformance and security, in the twenty-second
IEEE/ACM international conference – Proceedings of
the twenty-second IEEE/ACM international conference
on Automated software engineering - ASE ’07: ACM
Press, Atlanta, Georgia, USA, p. 393.
AlFedaghi, S., and Alkandari, A., 2011, On Security
Development Lifecycle: Conceptual Description of
Vulnerabilities, Risks, and Threats: International
Journal of Digital Content Technology and its
Applications, v. 5, p. 296–306.
Alhebaishi, N., Wang, L., and Singhal, A., 2019, Threat
Modeling for Cloud Infrastructures: ICST Transactions
on Security and Safety, v. 5, p. 156246.
Alwaheidi, M. K. S., and Islam, S., 2022, Data-Driven
Threat Analysis for Ensuring Security in Cloud Enabled
Systems: Sensors, v. 22, p. 5726.
Amini, A., Jamil, N., Ahmad, A. R., and Z`aba, M. R.,
2015, Threat Modeling Approaches for Securing Cloud
Computin: Journal of Applied Sciences, v. 15, p. 953–
967.
Bedi, P., Gandotra, V., Singhal, A., Narang, H., and
Sharma, S., 2013, Threat-oriented security framework
in risk management using multiagent system:
PROACTIVE RISK MANAGEMENT: Software:
Practice and Experience, v. 43, p. 1013–1038.
Berger, B. J., Sohr, K., and Koschke, R., 2016,
Automatically Extracting Threats from Extended Data
Flow Diagrams, in Caballero, J., Bodden, E., and
Athanasopoulos, E. eds., Engineering Secure Software
and Systems: Springer International Publishing, Cham,
p. 56–71.
Bromander, Jøsang, A., and Eian, M., 2016, Semantic
Cyberthreat Modelling: Proc. STIDS, p. 74–78.
Cheng, Y., Du, Y., Xu, J., Yuan, C., and Xue, Z., 2012,
Research on security evaluation of cloud computing
based on attack graph, in 2012 IEEE 2nd International
Conference on Cloud Computing and Intelligence
Systems:, p. 459–465.
Dhillon, D., 2011, Developer-Driven Threat Modeling:
Lessons Learned in the Trenches: IEEE Security and
Privacy, v. 9, p. 41–47.
Drake, V., 2022, Threat Modeling: OWASP.
Elahi, H., Wang, G., Xu, Y., Castiglione, A., Yan, Q., and
Shehzad, M. N., 2021, On the Characterization and
Risk Assessment of AI-Powered Mobile Cloud
Applications: Computer Standards & Interfaces, v. 78,
p. 103538.
Frydman, M., Ruiz, G., Heymann, E., César, E., and Miller,
B. P., 2014, Automating Risk Analysis of Software
Design Models (M. Ivanovic, Ed.): The Scientific
World Journal, v. 2014, p. 805856.
Gholami, A., and Laure, E., 2016, Advanced Cloud Privacy
Threat Modeling:
Girdhar, M., You, Y., Song, T.-J., Ghosh, S., and Hong, J.,
2022, Post-Accident Cyberattack Event Analysis for
Connected and Automated Vehicles: IEEE Access, v.
10, p. 83176–83194.
Hacks, S., Persson, L., and Hersén, N., 2022, Measuring
and achieving test coverage of attack simulations
extended version: Software and Systems Modeling.
Hong, J. B., Nhlabatsi, A., Kim, D. S., Hussein, A., Fetais,
N., and Khan, K. M., 2019, Systematic identification of
threats in the cloud: A survey: Computer Networks, v.
150, p. 46–69.
Kiesling, T., Krempel, M., Niederl, J., and Ziegler, J., 2016,
A Model-Based Approach for Aviation Cyber Security
Risk Assessment, in 2016 11th International
Conference on Availability, Reliability and Security
(ARES):, p. 517–525.
Kitchenham, B., and Charters, S. M., 2007, Guidelines for
performing systematic literature reviews in software
engineering:
Malik, N. A., Javed, M. Y., and Mahmud, U., 2008, Threat
Modeling in Pervasive Computing Paradigm, in 2008
New Technologies, Mobility and Security:, p. 1–5.
Mauri, L., and Damiani, E., 2022, Modeling Threats to AI-
ML Systems Using STRIDE: Sensors, v. 22, p. 6662.
Morana, M. M., and Uceda Vélez, T., 2015, Risk centric
threat modeling: process for attack simulation and
threat analysis: Wiley, Hoboken, New Jersey, 1 p.
Myagmar, S., Lee, A. J., and Yurcik, W., 2005, Threat
Modeling as a Basis for Security Requirements:
Proceedings of the IEEE Symposium on Requirements
Engineering for Information Security, p. 9.
Nyambo, et. al, D., 2014, An Approach for Systematically
Analyzing and Specifying Security Requirements for
the Converged Web-Mobile Applications: International
Journal of Computing and Digital Systems, v. 3, p. 207–
217.