A Comparative Analysis Study on Information Security Threat Models: A Propose for Threat Factor Profiling

Research Article
A Comparative Analysis Study on Information Security Threat Models: A Propose for Threat Factor Profiling

Fatimah Sidi, A. Jabar Marzanah, Lilly Suriani Affendey, Iskandar Ishak, Nurfadhlina Mohd Sharef, Maslina Zolkepli, Tan Ming Ming, Muhammad Faidhi Abd Mokthi, Maslina Daud, Naqliyah Bt Zainuddin and Rafidah Abdul Hamid

Journal of Engineering and Applied Sciences, 2017, 12(3), 548-554.

Abstract

This study describes a comparative analysis study conducted on existing approaches, frameworks and relevant references used in field of information security. The purpose of this study is to identify suitable components in developing a threat factor profiling. By having a threat factor profiling, organizations will have a clear understanding of the threats that they face and enable them to implement a proactive incident management program that focuses on the threat components. This study also discusses the proposed threat factor profiling.

ASCI-ID: 157-1604

Fulltext

Similar Articles


A Study of Performance Measurement Systems

Journal of Engineering and Applied Sciences, 2018, 13(12 SI), 9400-9402.

Design and Analysis of Secured Electronic Voting Protocol

Journal of Engineering and Applied Sciences, 2012, 7(2), 143-147.

A Novel Approach to Incorporate Efficient Security in Content Distribution

Journal of Engineering and Applied Sciences, 2014, 9(5), 190-197.

UAGNI an Intelligent Wildfire Monitoring and Assessment System

Journal of Engineering and Applied Sciences, 2017, 12(12), 3117-3123.

CRADG: A Chaotic RADG Security System

Journal of Engineering and Applied Sciences, 2017, 12(16), 4118-4122.

Balancing Sales and Safety: A Methodological Approach to Economic Security Analysis of Enterprises

Journal of Engineering and Applied Sciences, 2017, 12(19), 4974-4978.

A Review: Analysis and Comparison of Different Detection Techniques of IDPS

Journal of Engineering and Applied Sciences, 2017, 12(22), 5939-5943.

Secure Password Scheme Using Cryptography, Steganography and Top-K Retrieval Concept

Journal of Engineering and Applied Sciences, 2017, 12(2 SI), 6148-6151.

An Implementation of Honeypots in a Cloud Environment for Analyzing Attacks on Websites

Journal of Engineering and Applied Sciences, 2017, 12(2 SI), 6208-6214.

Development of Message Threat Model on the Basis of Composition of Fuzzy Automations

Journal of Engineering and Applied Sciences, 2017, 12(4 SI), 6837-6844.

Data Security in Hadoop: A Technological Perspective and Review

Journal of Engineering and Applied Sciences, 2017, 12(5 SI), 7069-7073.

Network Security: Internal and External Attacks

Journal of Engineering and Applied Sciences, 2017, 12(24), 7494-7500.

Definition of the Method of Determination of the Violator of Information Security in Process of Modeling the Threats of Information Security in the Information Systems of Processing Personal Data

Journal of Engineering and Applied Sciences, 2017, 12(6 SI), 7776-7778.

A Study on Improvement of Device Removal Processes from ZigBee Network

Journal of Engineering and Applied Sciences, 2018, 13(1), 254-258.

Internet of Things (IoT): Architectural Framework for Secure Payment Mode

Journal of Engineering and Applied Sciences, 2018, 13(2), 415-421.

Preliminary Study on Security Issues of Online Banking: A Case Study of Malaysia

Journal of Engineering and Applied Sciences, 2018, 13(3), 709-716.

A Study on Information Protection in Hospital Information System

Journal of Engineering and Applied Sciences, 2018, 13(4), 898-902.

Efficiently Process in Reducing the Load Risk from Security Using ABR (Associate-Based Routing) Routing Protocol

Journal of Engineering and Applied Sciences, 2018, 13(5), 1235-1238.

Transformation of Image Using Wavelet Transform for Image Watermarking of Text in Binary Images

Journal of Engineering and Applied Sciences, 2017, 12(9 SI), 8652-8656.

Symmetric Key Generation using Integrated System of Multi-Modal Biometrics and User-Password

Journal of Engineering and Applied Sciences, 2017, 12(9 SI), 8657-8660.

Data Encryption Employing Genetic Algorithm Based on a New Algorithm of Key Generator

Journal of Engineering and Applied Sciences, 2017, 12(9 SI), 8679-8682.

Penetration Testing: Vulnerability Analysis in a Virtual Environment

Journal of Engineering and Applied Sciences, 2017, 12(9 SI), 8723-8729.

UR5 New Symmetrical Algorithm For Security

Journal of Engineering and Applied Sciences, 2017, 12(12 SI), 9386-9388.

Building a Dynamic Virtual Machines Using KBR Agent for Data Security in Hybrid Cloud

Journal of Engineering and Applied Sciences, 2017, 12(12 SI), 9400-9404.

Implementation of PS2 Remote Control and Monitoring System for Android Operating System Based Robot Platform

Journal of Engineering and Applied Sciences, 2018, 13(7), 1851-1858.

S-RADG: A Stream Cipher RADG Cryptography

Journal of Engineering and Applied Sciences, 2018, 13(1 SI), 2317-2321.

Internet of Things-Proactive Security Approach

Journal of Engineering and Applied Sciences, 2018, 13(9), 2668-2671.

Design and Implementation of Smart Home Security System

Journal of Engineering and Applied Sciences, 2018, 13(2 SI), 2867-2871.

Security Service Technology in Self-Driving Environment

Journal of Engineering and Applied Sciences, 2018, 13(2 SI), 3007-3012.

Combined Theater-Level Command and Control

Journal of Engineering and Applied Sciences, 2018, 13(3 SI), 3255-3260.

Cross Layer Security Approach Using Friendly Jammers in Wireless Networks

Journal of Engineering and Applied Sciences, 2018, 13(4 SI), 3753-3757.

Investigation of Security and Privacy Methods for Public Mobile Cloud Computing

Journal of Engineering and Applied Sciences, 2018, 13(12), 4396-4402.

Smart Network Probes for Campus Network Incident Analysis

Journal of Engineering and Applied Sciences, 2018, 13(9 SI), 6961-6966.

Analysis of Security Attacks on Lightweight Block Ciphers and their Countermeasures

Journal of Engineering and Applied Sciences, 2018, 13(20), 8439-8447.

Analysis of Vulnerability and Security of AI Bluetooth Speaker Connected with IoT

Journal of Engineering and Applied Sciences, 2018, 13(11 SI), 8695-8699.

Secure Database Server Handles Spatial Location

Journal of Engineering and Applied Sciences, 2018, 13(12 SI), 9415-9418.

A Study on the Management and Security for a Web-Server System in the Same Area Using the Back-Door Type Private Network

Journal of Engineering and Applied Sciences, 2018, 13(12 SI), 9491-9496.

Mobile Ad Hoc Networks and Routing Protocols in IoT Enabled Smart Environment: A Review

Journal of Engineering and Applied Sciences, 2019, 14(3), 802-811.

LA-Based Approach for IoT Security

Journal of Engineering and Applied Sciences, 2019, 14(3), 951-959.

Burglar Detection using Deep Learning Techniques

Journal of Engineering and Applied Sciences, 2019, 14(8), 2672-2686.

An Updated Hybrid Cryptography Based Security for Cloud Computing System

Journal of Engineering and Applied Sciences, 2019, 14(10), 3359-3365.

Image and Password Multifactor Authentication Scheme for e-Voting

Journal of Engineering and Applied Sciences, 2019, 14(11), 3732-3740.

Blockchain Hash Function for Secure Biometric System

Journal of Engineering and Applied Sciences, 2019, 14(11), 3797-3805.

Factors Influencing Adoption of Electronic Payment System: Case Study on Iraq

Journal of Engineering and Applied Sciences, 2019, 14(12), 4235-4241.

An Energy Efficient Cluster based Routing Protocol for MANETs using DCCHSM Algorithm

Journal of Engineering and Applied Sciences, 2019, 14(15), 5287-5296.

Speech Encryption Based on Zaslavsky Map

Journal of Engineering and Applied Sciences, 2019, 14(17), 6392-6399.

Design and Implementation of Input/Output Port Blocker System to Thwart Input/Output Attacks

Journal of Engineering and Applied Sciences, 2019, 14(19), 7098-7104.

Implicit Drag and Drop Image CAPTCHA for Web Security

Journal of Engineering and Applied Sciences, 2019, 14(20), 7669-7678.

A Study on the Voice Authentication Security for Recorded Voice through Sound Color Marker Analysis

Journal of Engineering and Applied Sciences, 2019, 14(21), 7922-7927.

An IoT Enabled Home Automation System

Journal of Engineering and Applied Sciences, 2019, 14(Supplementary 01), 8496-8502.

Internet of Things: A Security Survey Review on Long Range Wide Area Network (LoRaWAN)

Journal of Engineering and Applied Sciences, 2019, 14(24), 9774-9787.

High-Assurance Security in Swift Component

Journal of Engineering and Applied Sciences, 2019, 14(7 SI), 10186-10194.

A Study of Text Steganography Methods

Journal of Engineering and Applied Sciences, 2020, 15(2), 369-372.

SIEM Implementation for Small and Mid-Sized Business Environments

Journal of Engineering and Applied Sciences, 2019, 14(9 SI), 10497-10501.

A Genetic Fuzzy Model for Investigating Security and Trust in E-Commerce with Genetic Algorithm

Journal of Engineering and Applied Sciences, 2020, 15(6), 1445-1450.

McEliece in RADG using Diffie-Hellman Key Exchange Security System

Journal of Engineering and Applied Sciences, 2020, 15(17), 3138-3145.