Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Software security economics and Thre...
~
Chen, Yue.
Linked to FindBook
Google Book
Amazon
博客來
Software security economics and Threat Modeling Based on Attack Path Analysis; a stakeholder value driven approach.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Software security economics and Threat Modeling Based on Attack Path Analysis; a stakeholder value driven approach./
Author:
Chen, Yue.
Description:
141 p.
Notes:
Adviser: Barry W. Boehm.
Contained By:
Dissertation Abstracts International69-01B.
Subject:
Computer Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3291915
ISBN:
9780549391838
Software security economics and Threat Modeling Based on Attack Path Analysis; a stakeholder value driven approach.
Chen, Yue.
Software security economics and Threat Modeling Based on Attack Path Analysis; a stakeholder value driven approach.
- 141 p.
Adviser: Barry W. Boehm.
Thesis (Ph.D.)--University of Southern California, 2007.
The thesis presents the T&barbelow;hreat M&barbelow;odeling Method Based on A&barbelow;ttack P&barbelow;ath Analysis (T-MAP) which quantifies security threats by calculating the total severity weights of relevant attacking paths for Commercial Off The Shelf (COTS) based systems. Further security economic analysis enabled by T-MAP is demonstrated. Compared to existing approaches, T-MAP is sensitive to system stakeholder value priorities and organizational IT environment. It distills the technical details of thousands of relevant software vulnerabilities into management-friendly numbers at a high-level; it systematically establishes the traceability and consistency from management-level organizational value propositions to technical-level security threats and corresponding mitigation strategies. In its trial usage in a large IT organization, T-MAP demonstrated promising strength in prioritizing and estimating security investment cost-effectiveness, as well as in evaluating the security performance of COTS systems. The steps of using T-MAP to optimize the cost-effectiveness of software patching, user account control and firewall are demonstrated through case studies. A system stakeholder value sensitive Firewall rule generation method based on T-MAP is introduced. In addition, a software tool that automates T-MAP has been developed.
ISBN: 9780549391838Subjects--Topical Terms:
626642
Computer Science.
Software security economics and Threat Modeling Based on Attack Path Analysis; a stakeholder value driven approach.
LDR
:02426nam 2200313 a 45
001
941164
005
20110518
008
110518s2007 ||||||||||||||||| ||eng d
020
$a
9780549391838
035
$a
(UMI)AAI3291915
035
$a
AAI3291915
040
$a
UMI
$c
UMI
100
1
$a
Chen, Yue.
$3
1265297
245
1 0
$a
Software security economics and Threat Modeling Based on Attack Path Analysis; a stakeholder value driven approach.
300
$a
141 p.
500
$a
Adviser: Barry W. Boehm.
500
$a
Source: Dissertation Abstracts International, Volume: 69-01, Section: B, page: 0408.
502
$a
Thesis (Ph.D.)--University of Southern California, 2007.
520
$a
The thesis presents the T&barbelow;hreat M&barbelow;odeling Method Based on A&barbelow;ttack P&barbelow;ath Analysis (T-MAP) which quantifies security threats by calculating the total severity weights of relevant attacking paths for Commercial Off The Shelf (COTS) based systems. Further security economic analysis enabled by T-MAP is demonstrated. Compared to existing approaches, T-MAP is sensitive to system stakeholder value priorities and organizational IT environment. It distills the technical details of thousands of relevant software vulnerabilities into management-friendly numbers at a high-level; it systematically establishes the traceability and consistency from management-level organizational value propositions to technical-level security threats and corresponding mitigation strategies. In its trial usage in a large IT organization, T-MAP demonstrated promising strength in prioritizing and estimating security investment cost-effectiveness, as well as in evaluating the security performance of COTS systems. The steps of using T-MAP to optimize the cost-effectiveness of software patching, user account control and firewall are demonstrated through case studies. A system stakeholder value sensitive Firewall rule generation method based on T-MAP is introduced. In addition, a software tool that automates T-MAP has been developed.
590
$a
School code: 0208.
650
4
$a
Computer Science.
$3
626642
650
4
$a
Economics, Commerce-Business.
$3
626649
690
$a
0505
690
$a
0984
710
2
$a
University of Southern California.
$b
Computer Science: Doctor of Philosophy.
$3
1026068
773
0
$t
Dissertation Abstracts International
$g
69-01B.
790
$a
0208
790
1 0
$a
Boehm, Barry W.,
$e
advisor
790
1 0
$a
Huang, Mingdeh
$e
committee member
790
1 0
$a
Neuman, Clifford
$e
committee member
790
1 0
$a
Steece, Bert
$e
committee member
791
$a
Ph.D.
792
$a
2007
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3291915
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9111138
電子資源
11.線上閱覽_V
電子書
EB W9111138
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login