Infrastructural Map for Information Security

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2

Abstract

The threat modeling process starts with the phases of identifying critical assets, creating an architecture overview, and decomposing to identify possible points of attack. Data flow diagrams and sequence diagrams are used in this process. This paper proposes an alternative flow-based methodology for building an architectural map for the system. It provides a high-level methodology for creating a blueprint of the organization to guide security planning in the network.

Authors and Affiliations

Sabah Al-Fedaghi , Hanaa Alnashwan

Keywords

Related Articles

EFFICIENT VM LOAD BALANCING ALGORITHM FOR A CLOUD COMPUTING ENVIRONMENT

Cloud computing is a fast growing area in computing research and industry today. With the advancement of the Cloud, there are new possibilities opening up on how applications can be built and how different services can b...

Parent Siblings Oriented Tree Quorum Protocol

In this paper, we are proposing a new replica control algorithm Parent Siblings Oriented Tree Quorum Protocol (PSTQ) for the management of replicated data in distributed database system. This algorithm imposes a logical...

A Survey on Hadoop Assisted K-Means Clustering of Hefty Volume Images

The objects or the overview of the objects in a remote sensing image can be detected or generated directly through the use of basic K-means clustering method. ENVI, ERDAS IMAGINE are some of the software that can be used...

K-Partition Model for Mining Frequent Patterns in Large Databases

Mining frequent patterns has always been a great field of research for investigators. Various algorithms were developed for finding out frequent patterns in an efficient manner. But the major drawback of all these resear...

AI based Digital Companding Scheme for OFDM system using custom constellation Mapping and selection

Data rate is important in telecommunication because it is irectly proportional to the cost of transmitting the signal. Saving bits is the same as saving money . In this paper we propose new digital companding scheme for...

Download PDF file
  • EP ID EP139764
  • DOI -
  • Views 131
  • Downloads 0

How To Cite

Sabah Al-Fedaghi, Hanaa Alnashwan (2011). Infrastructural Map for Information Security. International Journal on Computer Science and Engineering, 3(2), 789-796. https://europub.co.uk./articles/-A-139764