A comparative analysis study on information security threat models: a propose for threat factor profiling
This study describes a comparative analysis study conducted on existing approaches, frameworks and relevant references used in field of information security. The purpose of this study is to identify suitable components in developing a threat factor profiling. By having a threat factor profiling, org...
| Main Authors: | Sidi, Fatimah, A. Jabar, Marzanah, Affendey, Lilly Suriani, Ishak, Iskandar, Mohd Sharef, Nurfadhlina, Zolkepli, Maslina, Tan, Ming Ming, Abd Mokthi, Muhammad Faidhi, Daud, Maslina, Zainuddin, Naqliyah, Abdul Hamid, Rafidah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Medwell Journals
2017
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/60631/ http://psasir.upm.edu.my/id/eprint/60631/1/A%20comparative%20analysis%20study%20on%20information%20security%20threat%20models%20a%20propose%20for%20threat%20factor%20profiling.pdf |
Similar Items
Towards an enhancement of organizational information security through Threat Factor Profiling (TFP) model
by: Sidi, Fatimah, et al.
Published: (2017)
by: Sidi, Fatimah, et al.
Published: (2017)
Scoring matrix framework for threat factor profiling model
by: Daud, Maslina, et al.
Published: (2018)
by: Daud, Maslina, et al.
Published: (2018)
Security monitoring tool system using threat intelligence vs threat hunting
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
Suicide is a national security threat
by: Ng, Alvin Lai Oon *
Published: (2022)
by: Ng, Alvin Lai Oon *
Published: (2022)
Threats and solutions for ATM security systems
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
The politics of regional security threat in Nigeria
by: Sule, Babayo, et al.
Published: (2022)
by: Sule, Babayo, et al.
Published: (2022)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Household threat
by: Lee, Kian Seng
Published: (2023)
by: Lee, Kian Seng
Published: (2023)
China's oil diplomacy: is it a global security threat?
by: Lai, Hongyi
Published: (2007)
by: Lai, Hongyi
Published: (2007)
The impact on non-traditional security threats in Sri Lanka
by: Ong, Jessica Hai Liaw, et al.
Published: (2021)
by: Ong, Jessica Hai Liaw, et al.
Published: (2021)
Temporal trends analysis for dengue outbreak and network threats severity prediction accuracy improvement
by: Mohd Sharef, Nurfadhlina, et al.
Published: (2019)
by: Mohd Sharef, Nurfadhlina, et al.
Published: (2019)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
A Unified Classification Model of Insider Threats to Information Security.
by: Prabhu, sunitha, et al.
Published: (2020)
by: Prabhu, sunitha, et al.
Published: (2020)
Security threats of finger print biometric in network system environment
by: Taha, Imad, et al.
Published: (2011)
by: Taha, Imad, et al.
Published: (2011)
The Vietminh threat and the security of Thailand: Anglo-Thai response and attitude
by: Nik Anuar Nik Mahmud,
Published: (1988)
by: Nik Anuar Nik Mahmud,
Published: (1988)
Threats to auditor independence
by: Abu Bakar, Nur Barizah
Published: (2006)
by: Abu Bakar, Nur Barizah
Published: (2006)
Zika virus threat
by: Jennings, L., et al.
Published: (2016)
by: Jennings, L., et al.
Published: (2016)
Threats to Freedom of Speech
by: Zimmermann, A., et al.
Published: (2013)
by: Zimmermann, A., et al.
Published: (2013)
Tapir under threat
by: New Straits Times,
Published: (2013)
by: New Straits Times,
Published: (2013)
Re-emerging threat
by: Mustapha, Kasmiah
Published: (2016)
by: Mustapha, Kasmiah
Published: (2016)
Facing threat of superbugs
by: Mansor, Rozaihan
Published: (2016)
by: Mansor, Rozaihan
Published: (2016)
Enhancing truth discovery in document context finding using NER – based veracity evaluator framework
by: Azman, Siti Nuradilah, et al.
Published: (2015)
by: Azman, Siti Nuradilah, et al.
Published: (2015)
Understanding perceptions of security threats to Australia:
the case of refugees and asylum seekers
by: Bilombele, Asukulu P
Published: (2021)
by: Bilombele, Asukulu P
Published: (2021)
Security Threats of Computerised Banking Systems (CBS): the managers' perception in Malaysia
by: Malami, Abu Bakar, et al.
Published: (2012)
by: Malami, Abu Bakar, et al.
Published: (2012)
Smuggling of Rohingyas from Myanmar to Malaysia: a threat to human security
by: Andika Ab Wahab,, et al.
Published: (2020)
by: Andika Ab Wahab,, et al.
Published: (2020)
Security threats to privacy data of Malaysian youth’s: online transaction and communication
by: Shariffah Mamat,, et al.
Published: (2023)
by: Shariffah Mamat,, et al.
Published: (2023)
Cloud computing security threat with quantum key distribution defense model
by: Khalid, Roszelinda, et al.
Published: (2015)
by: Khalid, Roszelinda, et al.
Published: (2015)
Moth: a hybrid threat model for improving software security testing
by: Omotunde, Habeeb Oladapo
Published: (2018)
by: Omotunde, Habeeb Oladapo
Published: (2018)
A study of insider threat behaviour: developing a holistic insider threat model
by: Munshi, Asmaa Mahdi
Published: (2013)
by: Munshi, Asmaa Mahdi
Published: (2013)
Data-driven rice yield predictions and prescriptive analytics for sustainable agriculture in Malaysia
by: Marong, Muhammad, et al.
Published: (2024)
by: Marong, Muhammad, et al.
Published: (2024)
Countering the threat of Daesh in Malaysia
by: El-Muhammady, Ahmad
Published: (2016)
by: El-Muhammady, Ahmad
Published: (2016)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
The Threat to International Higher Education
by: Phillimore, John, et al.
Published: (2011)
by: Phillimore, John, et al.
Published: (2011)
Zahid: unity under threat
by: Abas, Azura
Published: (2017)
by: Abas, Azura
Published: (2017)
Tackling an emerging biodiversity threat
by: Hassan, Mohd Zafri
Published: (2019)
by: Hassan, Mohd Zafri
Published: (2019)
Systematic review of data quality research
by: Jaya, M. Izham, et al.
Published: (2019)
by: Jaya, M. Izham, et al.
Published: (2019)
Threat captures attention, but not automatically: Top-down goals modulate attentional orienting to threat distractors
by: Vromen, J., et al.
Published: (2016)
by: Vromen, J., et al.
Published: (2016)
Data visualization for agricultural data: benefits and challenges
by: Sidi, Fatimah, et al.
Published: (2017)
by: Sidi, Fatimah, et al.
Published: (2017)
The threat of Cyberterrorism and the applicability of the convention of cybercrime
by: Zulhuda, Sonny
Published: (2020)
by: Zulhuda, Sonny
Published: (2020)
Similar Items
-
Towards an enhancement of organizational information security through Threat Factor Profiling (TFP) model
by: Sidi, Fatimah, et al.
Published: (2017) -
Scoring matrix framework for threat factor profiling model
by: Daud, Maslina, et al.
Published: (2018) -
Security monitoring tool system using threat intelligence vs threat hunting
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021) -
Suicide is a national security threat
by: Ng, Alvin Lai Oon *
Published: (2022) -
Threats and solutions for ATM security systems
by: Alharaki, Omarah Omar, et al.
Published: (2011)