338:
cleaning ideas is often made, usually with an "anti-" style naming scheme related to a particular threat type. Threats and unusual behavior are identified by a system such as a firewall or an intrusion detection system, and then the following types of software are used to remove them. These types of software often require extensive research into their potential foes to achieve complete success, similar to the way that complete eradication of bacteria or viral threats does in the physical world. Occasionally this also represents defeating an attackers encryption, such as in the case of data tracing, or hardened threat removal.
194:. By doing this, various profiles of potential attackers are created, including their intentions, and a catalog of potential vulnerabilities are created for the respective organization to fix before a real threat arises. Threat modeling covers a wide aspect of cyberspace, including devices, applications, systems, networks, or enterprises. Cyber threat modeling can inform organizations with their efforts pertaining to cybersecurity in the following ways:
751:
214:
comparison is often made to a shield. A form of protection whose use is heavily dependent on the system owners preferences and perceived threats. Large numbers of users may be allowed relatively low-level access with limited security checks, yet significant opposition will then be applied toward users attempting to move toward critical areas.
162:
The primary purpose of these types of systems is to restrict and often to completely prevent access to computers or data except to a very limited set of users. The theory is often that if a key, credential, or token is unavailable then access should be impossible. This often involves taking valuable
337:
The purpose of these types of software is to remove malicious or harmful forms of software that may compromise the security of a computer system. These types of software are often closely linked with software for computer regulation and monitoring. A physical comparison to a doctor, scrubbing, or
213:
The purpose of these types of systems is usually to restrict access to computers or data while still allowing interaction. Often this involves monitoring or checking credential, separating systems from access and view based on importance, and quarantining or isolating perceived dangers. A physical
239:
The purpose of these types of software systems is to monitor access to computers systems and data while reporting or logging the behavior. Often this is composed of large quantities of low priority data records / logs, coupled with high priority notices for unusual or suspicious behavior.
128:
The computer security software products industry was launched in the second half of the 1970s when computer firms and new IT startups chose alternative paths to offer commercial access control systems to organizational mainframe computer users. These developments were led by
45:. This is often taken in the context of defending computer systems or data, yet can incorporate programs designed specifically for subverting computer systems due to their significant overlap, and the adage that the best defense is a good offense.
154:. Although both security and usability are desired, today it is widely considered in computer security software that with higher security comes decreased usability, and with higher usability comes decreased security.
145:
Below, various software implementations of
Cybersecurity patterns and groups outlining ways a host system attempts to secure itself and its assets from malicious interactions, this includes tools to deter both
605:
399:
293:
These programs use algorithms either stolen from, or provided by, the police and military internet observation organizations to provide the equivalent of a police
163:
information and then either reducing it to apparent noise or hiding it within another source of information in such a way that it is unrecoverable.
645:
190:. Threat modeling is the process of creating and applying mock situations where an attacker could be trying to maliciously access data in
582:
1189:
281:
17:
1166:
557:
486:
1223:
1197:
394:
638:
1129:
465:
925:
134:
1179:
271:
992:
631:
389:
122:
114:
521:
1184:
1105:
905:
255:
228:
53:
1161:
775:
249:
1022:
740:
507:
1007:
885:
780:
357:
1095:
1047:
710:
314:
261:
276:
317:
in the global information monitoring perspective. Several instant messaging programs such as
1136:
870:
494:
1156:
1068:
1017:
962:
830:
803:
785:
683:
654:
549:
Risk management for computer security : Protecting your network and information assets
362:
223:
42:
750:
8:
940:
715:
673:
180:
171:
329:(rumored 3PLA/4PLA connections) may represent extensions of these observation apparati.
1124:
1052:
957:
367:
266:
244:
1172:
930:
865:
815:
762:
720:
668:
563:
553:
461:
379:
298:
151:
58:
1141:
1081:
845:
835:
730:
432:
301:
concepts for internet traffic, cell phone communication, and physical systems like
68:
63:
38:
421:"The Origin and Early History of the Computer Security Software Products Industry"
1032:
1012:
910:
735:
725:
93:
482:
1202:
1100:
950:
900:
875:
840:
820:
700:
688:
420:
342:
218:
147:
109:
186:
A critical tool used in developing software that prevents malicious access is
1217:
1112:
1073:
1042:
1037:
890:
880:
850:
583:"Under tough surveillance, China's cybercriminals find creative ways to chat"
567:
384:
294:
176:
1146:
1002:
705:
352:
347:
167:
81:
547:
1086:
920:
895:
860:
695:
552:. Debi Ashenden. Amsterdam, Netherlands: Elsevier Butterworth-Heinemann.
483:"Cyber Threat Modeling: Survey, Assessment, and Representative Framework"
436:
481:
Bodeau, Deborah J.; McCollum, Catherine D.; Fox, David B. (2018-04-07).
1151:
967:
915:
798:
678:
623:
191:
87:
1027:
982:
977:
825:
793:
987:
945:
808:
118:
76:
49:
997:
972:
935:
855:
770:
322:
306:
103:
310:
305:. In a global perspective they are related to the fields of
302:
101:
for further references in this article due to issues with
318:
130:
79:
or their unauthorized use is referred to using the terms
606:"Mass surveillance risk real with Chinese apps: Experts"
460:. Springer International Publishing. pp. 395–398.
326:
204:Considerations for future security implementations
480:
1215:
321:(founded by "former" members of Unit 8200), or
201:Profiling of current cybersecurity applications
639:
580:
646:
632:
332:
52:against intrusion and unauthorized use of
1190:Security information and event management
297:. Most of these systems are born out of
282:Security information and event management
27:Computer program for information security
653:
603:
489:from the original on September 29, 2021.
458:Information Technology - New Generations
455:
522:"Threat Modeling: 12 Available Methods"
425:IEEE Annals of the History of Computing
288:
14:
1216:
581:O'Neill, Patrick Howell (3 May 2017).
1167:Host-based intrusion detection system
627:
545:
137:and SKK's Access Control Facility 2.
418:
1198:Runtime application self-protection
395:Cloud Workload Protection Platforms
24:
749:
208:
25:
1235:
1130:Security-focused operating system
604:Dasgupta, Binayak (1 July 2020).
456:Barragán, Claudio Casado (2017).
234:
157:
926:Insecure direct object reference
135:Resource Access Control Facility
1180:Information security management
272:Security information management
597:
574:
539:
514:
474:
449:
412:
13:
1:
405:
390:Emergency management software
125:'hat' color identification).
608:. Hindustan Times, New Delhi
62:. Similarly, the defense of
7:
1185:Information risk management
1106:Multi-factor authentication
662:Related security categories
400:Computer Antivirus Software
373:
256:Intrusion prevention system
10:
1240:
1224:Computer security software
1162:Intrusion detection system
1120:Computer security software
776:Advanced persistent threat
250:Intrusion detection system
31:Computer security software
1061:
761:
747:
741:Digital rights management
661:
419:Yost, Jeffrey R. (2015).
277:Security event management
886:Denial-of-service attack
781:Arbitrary code execution
358:Anti-subversion software
140:
1096:Computer access control
1048:Rogue security software
711:Electromagnetic warfare
333:Block or remove malware
262:Log management software
1142:Obfuscation (software)
871:Browser Helper Objects
755:
502:Cite journal requires
41:designed to influence
35:cybersecurity software
18:Cybersecurity software
1137:Data-centric security
1018:Remote access trojans
753:
1069:Application security
963:Privilege escalation
831:Cross-site scripting
684:Cybersex trafficking
655:Information security
546:Jones, Andy (2005).
437:10.1109/MAHC.2015.21
363:Anti-tamper software
289:Surveillance monitor
97:(later shortened to
43:information security
716:Information warfare
674:Automotive security
181:Steganography tools
172:Encryption software
113:and differences in
1125:Antivirus software
993:Social engineering
958:Polymorphic engine
911:Fraudulent dialers
816:Hardware backdoors
756:
368:Antivirus software
267:Records Management
245:Diagnostic program
75:The subversion of
1211:
1210:
1173:Anomaly detection
1078:Secure by default
931:Keystroke loggers
866:Drive-by download
754:vectorial version
721:Internet security
669:Computer security
585:. SNG. cyberscoop
559:978-0-08-049155-4
528:. 2 December 2018
380:Computer security
299:mass surveillance
64:computer networks
59:computer security
16:(Redirected from
1231:
1082:Secure by design
1013:Hardware Trojans
846:History sniffing
836:Cross-site leaks
731:Network security
648:
641:
634:
625:
624:
618:
617:
615:
613:
601:
595:
594:
592:
590:
578:
572:
571:
543:
537:
536:
534:
533:
518:
512:
511:
505:
500:
498:
490:
478:
472:
471:
453:
447:
446:
444:
443:
416:
152:security threats
94:security hacking
69:network security
39:computer program
21:
1239:
1238:
1234:
1233:
1232:
1230:
1229:
1228:
1214:
1213:
1212:
1207:
1057:
757:
745:
736:Copy protection
726:Mobile security
657:
652:
622:
621:
611:
609:
602:
598:
588:
586:
579:
575:
560:
544:
540:
531:
529:
520:
519:
515:
503:
501:
492:
491:
479:
475:
468:
454:
450:
441:
439:
417:
413:
408:
376:
343:Anti-keyloggers
335:
291:
237:
211:
209:Regulate access
198:Risk Management
188:Threat Modeling
160:
143:
48:The defense of
28:
23:
22:
15:
12:
11:
5:
1237:
1227:
1226:
1209:
1208:
1206:
1205:
1203:Site isolation
1200:
1195:
1194:
1193:
1187:
1177:
1176:
1175:
1170:
1159:
1154:
1149:
1144:
1139:
1134:
1133:
1132:
1127:
1117:
1116:
1115:
1110:
1109:
1108:
1101:Authentication
1093:
1092:
1091:
1090:
1089:
1079:
1076:
1065:
1063:
1059:
1058:
1056:
1055:
1050:
1045:
1040:
1035:
1030:
1025:
1020:
1015:
1010:
1005:
1000:
995:
990:
985:
980:
975:
970:
965:
960:
955:
954:
953:
943:
938:
933:
928:
923:
918:
913:
908:
903:
901:Email spoofing
898:
893:
888:
883:
878:
873:
868:
863:
858:
853:
848:
843:
841:DOM clobbering
838:
833:
828:
823:
821:Code injection
818:
813:
812:
811:
806:
801:
796:
788:
783:
778:
773:
767:
765:
759:
758:
748:
746:
744:
743:
738:
733:
728:
723:
718:
713:
708:
703:
701:Cyberterrorism
698:
693:
692:
691:
689:Computer fraud
686:
676:
671:
665:
663:
659:
658:
651:
650:
643:
636:
628:
620:
619:
596:
573:
558:
538:
513:
504:|journal=
473:
466:
448:
410:
409:
407:
404:
403:
402:
397:
392:
387:
382:
375:
372:
371:
370:
365:
360:
355:
350:
345:
334:
331:
290:
287:
286:
285:
279:
274:
269:
264:
259:
253:
247:
236:
235:Monitor access
233:
232:
231:
226:
221:
219:Access control
210:
207:
206:
205:
202:
199:
184:
183:
174:
159:
158:Prevent access
156:
142:
139:
110:hacker culture
26:
9:
6:
4:
3:
2:
1236:
1225:
1222:
1221:
1219:
1204:
1201:
1199:
1196:
1191:
1188:
1186:
1183:
1182:
1181:
1178:
1174:
1171:
1168:
1165:
1164:
1163:
1160:
1158:
1155:
1153:
1150:
1148:
1145:
1143:
1140:
1138:
1135:
1131:
1128:
1126:
1123:
1122:
1121:
1118:
1114:
1113:Authorization
1111:
1107:
1104:
1103:
1102:
1099:
1098:
1097:
1094:
1088:
1085:
1084:
1083:
1080:
1077:
1075:
1074:Secure coding
1072:
1071:
1070:
1067:
1066:
1064:
1060:
1054:
1051:
1049:
1046:
1044:
1043:SQL injection
1041:
1039:
1036:
1034:
1031:
1029:
1026:
1024:
1023:Vulnerability
1021:
1019:
1016:
1014:
1011:
1009:
1008:Trojan horses
1006:
1004:
1003:Software bugs
1001:
999:
996:
994:
991:
989:
986:
984:
981:
979:
976:
974:
971:
969:
966:
964:
961:
959:
956:
952:
949:
948:
947:
944:
942:
939:
937:
934:
932:
929:
927:
924:
922:
919:
917:
914:
912:
909:
907:
904:
902:
899:
897:
894:
892:
891:Eavesdropping
889:
887:
884:
882:
881:Data scraping
879:
877:
874:
872:
869:
867:
864:
862:
859:
857:
854:
852:
851:Cryptojacking
849:
847:
844:
842:
839:
837:
834:
832:
829:
827:
824:
822:
819:
817:
814:
810:
807:
805:
802:
800:
797:
795:
792:
791:
789:
787:
784:
782:
779:
777:
774:
772:
769:
768:
766:
764:
760:
752:
742:
739:
737:
734:
732:
729:
727:
724:
722:
719:
717:
714:
712:
709:
707:
704:
702:
699:
697:
694:
690:
687:
685:
682:
681:
680:
677:
675:
672:
670:
667:
666:
664:
660:
656:
649:
644:
642:
637:
635:
630:
629:
626:
607:
600:
584:
577:
569:
565:
561:
555:
551:
550:
542:
527:
523:
517:
509:
496:
488:
484:
477:
469:
467:9783319549774
463:
459:
452:
438:
434:
430:
426:
422:
415:
411:
401:
398:
396:
393:
391:
388:
386:
385:Data security
383:
381:
378:
377:
369:
366:
364:
361:
359:
356:
354:
351:
349:
346:
344:
341:
340:
339:
330:
328:
324:
320:
316:
313:and approach
312:
308:
304:
300:
296:
295:Radio scanner
283:
280:
278:
275:
273:
270:
268:
265:
263:
260:
257:
254:
251:
248:
246:
243:
242:
241:
230:
227:
225:
222:
220:
217:
216:
215:
203:
200:
197:
196:
195:
193:
189:
182:
178:
177:Steganography
175:
173:
169:
166:
165:
164:
155:
153:
149:
138:
136:
132:
126:
124:
120:
116:
112:
111:
106:
105:
100:
96:
95:
90:
89:
84:
83:
78:
73:
71:
70:
65:
61:
60:
55:
51:
46:
44:
40:
36:
32:
19:
1147:Data masking
1119:
706:Cyberwarfare
610:. Retrieved
599:
587:. Retrieved
576:
548:
541:
530:. Retrieved
525:
516:
495:cite journal
476:
457:
451:
440:. Retrieved
431:(2): 46–58.
428:
424:
414:
353:Anti-spyware
348:Anti-malware
336:
292:
238:
212:
187:
185:
168:Cryptography
161:
144:
127:
108:
102:
98:
92:
86:
82:cyberwarfare
80:
74:
67:
57:
47:
34:
30:
29:
1087:Misuse case
921:Infostealer
896:Email fraud
861:Data breach
696:Cybergeddon
150:and active
1152:Encryption
1028:Web shells
968:Ransomware
916:Hacktivism
679:Cybercrime
612:22 October
589:22 October
532:2021-10-04
442:2023-12-13
406:References
192:cyberspace
88:cybercrime
66:is called
56:is called
983:Shellcode
978:Scareware
826:Crimeware
786:Backdoors
568:159937634
77:computers
54:resources
50:computers
1218:Category
1157:Firewall
1062:Defenses
988:Spamming
973:Rootkits
946:Phishing
906:Exploits
526:SEI Blog
487:Archived
374:See also
224:Firewall
998:Spyware
941:Payload
936:Malware
876:Viruses
856:Botnets
763:Threats
229:Sandbox
148:passive
99:hacking
37:is any
1192:(SIEM)
1169:(HIDS)
1053:Zombie
790:Bombs
771:Adware
566:
556:
464:
323:WeChat
315:GEOINT
307:SIGINT
284:(SIEM)
104:hacker
1038:Worms
1033:Wiper
951:Voice
799:Logic
311:ELINT
258:(IPS)
252:(IDS)
141:Types
123:black
115:white
91:, or
804:Time
794:Fork
614:2020
591:2020
564:OCLC
554:ISBN
508:help
462:ISBN
325:and
309:and
303:CCTV
179:and
170:and
119:grey
809:Zip
433:doi
319:ICQ
133:'s
131:IBM
33:or
1220::
562:.
524:.
499::
497:}}
493:{{
485:.
429:37
427:.
423:.
327:QQ
107:,
85:,
72:.
647:e
640:t
633:v
616:.
593:.
570:.
535:.
510:)
506:(
470:.
445:.
435::
121:/
117:/
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.