METHODS AND SYSTEMS FOR ARCHITECTURE-CENTRIC THREAT MODELING, ANALYSIS AND VISUALIZATION

Methods and systems for use in architecture-centric threat modeling are described. One example system includes a display device, a memory device for storing a plurality of attributes for each of a plurality of network objects, and a processor communicatively coupled to the memory device. The process...

Full description

Saved in:
Bibliographic Details
Main Authors REID DION STEPHEN DAVID, GRUBEL BRIAN CHRISTOPHER
Format Patent
LanguageEnglish
Published 05.06.2014
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Methods and systems for use in architecture-centric threat modeling are described. One example system includes a display device, a memory device for storing a plurality of attributes for each of a plurality of network objects, and a processor communicatively coupled to the memory device. The processor is programmed to receive a user selection of at least a first network object and a second network object from the plurality of network objects; create a network architecture including the first network object and the second network object; associate the stored plurality of attributes with the selected network objects in the network architecture; display, on the display device, a graphical representation of the created network architecture; receive, from the user, at least one dataflow attribute associated with at least one of the first and second network objects; and store the at least one dataflow attribute to said memory device as an attribute of at least one of the plurality of network objects.
Bibliography:Application Number: US201213690517