TY - GEN
T1 - A Comparative Analysis of Threat Modelling Methods: STRIDE, DREAD, VAST, PASTA, OCTAVE, and LINDDUN
AU - Naik, Nitin
AU - Jenkins, Paul
AU - Grace, Paul
AU - Naik, Dishita
AU - Prajapat, Shaligram
AU - Song, Jingping
PY - 2024/12/20
Y1 - 2024/12/20
N2 - Novel cybersecurity threats are constantly emerging and posing significant security challenges to organisations; therefore, it is important for organisations to proactively analyse existing and emerging cybersecurity threats against their systems. Threat modelling methods are very effective in proactively analysing cybersecurity threats and enhancing organisational security policies and defence mechanisms against these cybersecurity threats. Several threat modelling methods have been proposed, and it is important for security experts to select the appropriate threat modelling method for an organisation according to their specific security challenges and cybersecurity threats. This paper will present a comparative analysis of six threat modelling methods: STRIDE, DREAD, VAST, PASTA, OCTAVE, and LINDDUN. It will provide a concise description of all the aforementioned threat modelling methods, and subsequently, a comparative analysis of these six threat modelling methods for highlighting their relative strengths and limitations.
AB - Novel cybersecurity threats are constantly emerging and posing significant security challenges to organisations; therefore, it is important for organisations to proactively analyse existing and emerging cybersecurity threats against their systems. Threat modelling methods are very effective in proactively analysing cybersecurity threats and enhancing organisational security policies and defence mechanisms against these cybersecurity threats. Several threat modelling methods have been proposed, and it is important for security experts to select the appropriate threat modelling method for an organisation according to their specific security challenges and cybersecurity threats. This paper will present a comparative analysis of six threat modelling methods: STRIDE, DREAD, VAST, PASTA, OCTAVE, and LINDDUN. It will provide a concise description of all the aforementioned threat modelling methods, and subsequently, a comparative analysis of these six threat modelling methods for highlighting their relative strengths and limitations.
UR - https://www.techrxiv.org/users/845749/articles/1234181-a-comparative-analysis-of-threat-modelling-methods-stride-dread-vast-pasta-octave-and-linddun?commit=09dec9318db01f4d93ebe23399f59c971e1681c9
UR - https://link.springer.com/chapter/10.1007/978-3-031-74443-3_16
U2 - 10.1007/978-3-031-74443-3_16
DO - 10.1007/978-3-031-74443-3_16
M3 - Conference publication
SN - 978-3-031-74442-6
T3 - Lecture Notes in Networks and Systems (LNNS)
SP - 271
EP - 280
BT - Contributions Presented at The International Conference on Computing, Communication, Cybersecurity and AI, July 3–4, 2024, London, UK: The C3AI 2024
A2 - Naik, Nitin
A2 - Jenkins, Paul
A2 - Prajapat, Shaligram
A2 - Grace, Paul
ER -