Sign In
Not register? Register Now!
Pages:
2 pages/≈550 words
Sources:
4 Sources
Style:
MLA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 12.96
Topic:

Pros and Cons of Operationally Critical Threat, Asset, and Vulnerability Threat Model

Research Paper Instructions:

Select one of the threat models (OCTAVE, Trike, PASTA, STRIDE, or VAST), and use the Internet to research this model. How is it used? What are its advantages? What are its disadvantages? Write a one-page paper on your research.
Search the Internet for information on TAXII and STIX. Write a two-paragraph explanation of each technology, how it is used, and its strengths and weaknesses.
Place both in one large document with a page break in between and a title page for both.

Research Paper Sample Content Preview:
Student’s Name
Instructor’s Name
Course
Date
Threat Models: Part One
OCTAVE Threat Model
OCTAVE is an acronym for Operationally Critical Threat, Asset, and Vulnerability. The threat modeling applies high-level programming language in solving both linear and non-linear problems numerically as a path to evaluating cybersecurity threats (Sharan et al. 234). The threat designers focused on creating a practice that would assess non-technical organizational risks arising from breached data sets. In applying the threat model, the administration first identifies the organization's information assets. Then, the personnel responsible for implementing the threat model assign attributes to the datasets of the assets by ensuring that they relate with the stored data (Sharan et al. 235). The intention is to eliminate excessive documentation for an organization's assets defined poorly or those outside the project's purview.
Advantages 
* OCTAVE threat model's base languages are C, C++, and FORTRAN (Meszaros and Buchalcevova 305). Combining these languages makes it faster in identifying and averting threats related to cybersecurity. Cybersecurity threat assessment requires mathematical expressions that can help identify all potential threats facing an organization's datasets. Using OCTAVE, information technology engineers adopt the threat model because its syntax closely relates to mathematical expressions. There are no other threat models that offer IT engineers the possibility of using computations to evaluate risk within the organization other than OCTAVE. 
* The threat model is practice-focused because it is useful when organizations create a risk-aware corporate culture (Meszaros and Buchalcevova 303). Based on the security objectives and the scope of the risks, the OCTAVE threat model is highly customizable to meet these organizational needs.
Disadvantage
One weakness associated with the OCTAVE's application is the challenge of managing voluminous documentation. It means that the OCTAVE lacks scalability (Meszaros and Buchalcevova 308). The threat model becomes unmanageable with large volumes of documentation arising from technological systems adding users, new applications, processes, and functionalities.
Works Cited
Sharan, Zaied Saad, Nur Rothman, and Tri Kuntoro Priyambodo. "System Security Awareness Planning Model Using The Octave Method Approach." IJCCS (Indonesian Journal of Computing and Cyberne...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These MLA Research Paper Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!