Infrastructural Map for Information Security

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2

Abstract

The threat modeling process starts with the phases of identifying critical assets, creating an architecture overview, and decomposing to identify possible points of attack. Data flow diagrams and sequence diagrams are used in this process. This paper proposes an alternative flow-based methodology for building an architectural map for the system. It provides a high-level methodology for creating a blueprint of the organization to guide security planning in the network.

Authors and Affiliations

Sabah Al-Fedaghi , Hanaa Alnashwan

Keywords

Related Articles

Mining Weighted Association Rule using FP – tree

The main goal of association rule mining is to examine large transaction databases which reveal implicit relationship among the data attributes. Classical association rule mining model assumes that all items have same si...

Intelligent and Effective Heart Disease Prediction System using Weighted Associative Classifiers

The healthcare environment is still ‘information rich’ But ‘knowledge poor’. There is a wealth of data available within the health care systems. However, there is a lack of effective analysis tools to discover hidden rel...

General Framework for Cluster based Active Learning Algorithm

This paper revisits the problem of active learning and decision making when the cost of labeling incurs cost and unlabeled data is available in abundance. In many real world applications large amounts of data are availab...

A Mixed-Mode Signal Processing Architecture for Radix-2 DHT

This paper proposes a mixed-mode signal processing architecture for radix-2 DHT. In the known algorithms, the stage structures perform all the additions and multiplications. The proposed algorithm introduces multiplying...

Efficient Parallel Data Processing in the Cloud

Cloud computing is a distributed computing technology which is the combination of hardware and software and delivered as a service to store, manage and process data. A new system is proposed to allocate resources dynamic...

Download PDF file
  • EP ID EP139764
  • DOI -
  • Views 146
  • Downloads 0

How To Cite

Sabah Al-Fedaghi, Hanaa Alnashwan (2011). Infrastructural Map for Information Security. International Journal on Computer Science and Engineering, 3(2), 789-796. https://europub.co.uk/articles/-A-139764