A Model of Threats to the Confidentiality of Information Processed in Cyberspace Based on the Information Flows Model
This article covers one of the fundamental problems of information security—building a threat model. The article discusses a new method for identifying typical threats to information confidentiality based on the information flow model. The threat model is based on the description of the system. An i...
Saved in:
Published in: | Symmetry (Basel) Vol. 12; no. 11; p. 1840 |
---|---|
Main Authors: | , , |
Format: | Journal Article |
Language: | English |
Published: |
MDPI AG
01-11-2020
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | This article covers one of the fundamental problems of information security—building a threat model. The article discusses a new method for identifying typical threats to information confidentiality based on the information flow model. The threat model is based on the description of the system. An incorrect description of the system leads to the formation of an incorrect threat model. A review of the subject area revealed several approaches used to describe the system in terms of circulating information flows. Each of these approaches has its own pros and cons. The model of information flows proposed in this work reduces the description of any information system to an eight-digit alphabet. Analysis of the structure of the elementary information flow identified four typical threats to confidentiality, the Cartesian product of a set of threats and a set of streams is a complete model of typical threats to the confidentiality of information processed in cyberspace. |
---|---|
ISSN: | 2073-8994 2073-8994 |
DOI: | 10.3390/sym12111840 |