Threat ripple model: A model to characterize business-oriented attacks based on business dependencies
Traditional attack descriptions and threat modeling are discussed directly from the perspective of attacking infrastructure, i.e., platforms, using malicious code. For example, it is believed that exploiting vulnerabilities to access the system, and then invading the target platform that support the...
Saved in:
| Main Authors: | Ao Shiliang, Fang Binxing, Xiao Xinguang, Zhang Hongli |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
EDP Sciences
2025-01-01
|
| Series: | Security and Safety |
| Subjects: | |
| Online Access: | https://sands.edpsciences.org/articles/sands/full_html/2025/01/sands20240035/sands20240035.html |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Deriving Usability Evaluation Criteria for Threat Modeling Tools
by: Inno Hwang, et al.
Published: (2025-01-01) -
APT attack threat-hunting network model based on hypergraph Transformer
by: Yuancheng LI, et al.
Published: (2024-02-01) -
Systematic Cyber Threat Modeling for Maritime Operations: Attack Trees for Shipboard Systems
by: Omer F. Keskin, et al.
Published: (2025-03-01) -
Analysis of submerged breakwater models using ripple tank
by: Mutmainnah Mutmainnah, et al.
Published: (2023-08-01) -
Hybrid nature of modern threats for cybersecurity and information security
by: Oleksandr TSARUK, et al.
Published: (2020-03-01)