[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …
was originally developed to enhance software security during the design phase but has …
Privacy champions in software teams: Understanding their motivations, strategies, and challenges
Software development teams are responsible for making and implementing software design
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …
Adopting threat modelling in agile software development projects
The goal of secure software engineering is to create software that keeps performing as
intended, even when exposed to attacks. Threat modelling is considered to be a key activity …
intended, even when exposed to attacks. Threat modelling is considered to be a key activity …
A systematic review and analytical evaluation of security requirements engineering approaches
Security is an inevitable concern in today's scenario of software-based application's
pervasiveness and development practices. Researchers and practitioners frequently …
pervasiveness and development practices. Researchers and practitioners frequently …
Automating the early detection of security design flaws
Security by design is a key principle for realizing secure software systems and it is advised
to hunt for security flaws from the very early stages of development. At design-time, security …
to hunt for security flaws from the very early stages of development. At design-time, security …
Automated risk management based software security vulnerabilities management
An automated risk assessment approach is explored in this work. The focus is to optimize
the conventional threat modeling approach to explore software system vulnerabilities. Data …
the conventional threat modeling approach to explore software system vulnerabilities. Data …
[HTML][HTML] Continuous software security through security prioritisation meetings
Software security needs to be a continuous endeavour in current software development
practices. Frequent software updates, paired with an ongoing flow of security breaches …
practices. Frequent software updates, paired with an ongoing flow of security breaches …
Threat modelling and agile software development: Identified practice in four Norwegian organisations
K Bernsmed, MG Jaatun - … on Cyber Security and Protection of …, 2019 - ieeexplore.ieee.org
Threat modelling is considered a key activity in secure software engineering. However,
despite its documented benefits it has not (yet) been widely adopted by agile software …
despite its documented benefits it has not (yet) been widely adopted by agile software …
Threat modeling state of practice in Dutch organizations
Threat modeling is a key technique to apply a security by design mindset, allowing the
systematic identification of security and privacy threats based on design-level abstractions of …
systematic identification of security and privacy threats based on design-level abstractions of …
Security risk assessment and management as technical debt
K Rindell, J Holvitie - … on Cyber Security and Protection of …, 2019 - ieeexplore.ieee.org
The endeavor to achieving software security consists of a set of risk-based security
engineering processes during software development. In iterative software development, the …
engineering processes during software development. In iterative software development, the …