Corpus ID: 15744381

A Threat-Driven Approach to Cyber Security Methodologies , Practices and Tools to Enable a Functionally Integrated Cyber Security Organization

@inproceedings{Muckin2015ATA,
  title={A Threat-Driven Approach to Cyber Security Methodologies , Practices and Tools to Enable a Functionally Integrated Cyber Security Organization},
  author={Michael Muckin},
  year={2015}
}
Contemporary cyber security risk management practices are largely driven by compliance requirements, which force organizations to focus on security controls and vulnerabilities. Risk management considers multiple facets – including assets, threats, vulnerabilities and controls – which are jointly evaluated with the variables of probability and impact. Threats cause damage to information systems. Threats utilize vulnerabilities to enact this damage, and security controls are implemented to… Expand
16 Citations
Defendable Architectures Achieving Cyber Security by Designing for Intelligence Driven Defense
  • Highly Influenced
  • PDF
Applying Indications and Warning Frameworks to Cyber Incidents
  • 1
  • PDF
A REVIEW OF GAME THEORY APPROACH TO CYBER SECURITY RISK MANAGEMENT
  • 3
  • Highly Influenced
  • PDF
Security Risk Management of E-commerce Systems
  • 1
Automating Threat Intelligence for SDL
  • PDF
Applying a Threat Model to Cloud Computing
  • Highly Influenced
...
1
2
...

References

SHOWING 1-10 OF 51 REFERENCES
Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
  • 510
  • Highly Influential
  • PDF
Cyber Threat Metrics
  • 39
  • PDF
The Diamond Model of Intrusion Analysis
  • 96
  • PDF
Open Web Application Security Project
  • Dirk Fox
  • Computer Science
  • Datenschutz und Datensicherheit - DuD
  • 2006
  • 170
  • PDF
for Sandia National Laboratories
  • 117
  • PDF
Defendable Architectures
  • 2015.
  • 2015
STRIDE Chart
  • 11 September 2007. [Online]. Available: http://blogs.microsoft.com/cybertrust/2007/09/11/stride-chart/.
  • 2007
...
1
2
3
4
5
...