Content deleted Content added
m Open access bot: url-access updated in citation with #oabot. |
Citation bot (talk | contribs) Removed URL that duplicated identifier. Removed access-date with no URL. Removed parameters. | Use this bot. Report bugs. | #UCB_CommandLine |
||
Line 7:
The subversion of [[computer]]s or their unauthorized use is referred to using the terms ''[[cyberwarfare]]'', ''[[cybercrime]]'', or ''[[Security hacker|security hacking]]'' (later shortened to ''hacking'' for further references in this article due to issues with ''[[hacker]]'', ''[[hacker culture]]'' and differences in [[White hat (computer security)|white]]/[[Grey hat|grey]]/[[Black hat (computer security)|black]] 'hat' color identification).
The computer security software products industry was launched in the second half of the 1970s when computer firms and new IT startups chose alternative paths to offer commercial access control systems to organizational mainframe computer users. These developments were led by [[IBM]]'s [[Resource Access Control Facility]] and SKK's Access Control Facility 2.<ref>{{Cite journal |title=The Origin and Early History of the Computer Security Software Products Industry
==Types==
Line 17:
* [[Steganography]] and [[Steganography tools]]
A critical tool used in developing software that prevents malicious access is ''Threat Modeling''.<ref>{{Cite journal|last1=Bodeau|first1=Deborah J.|last2=McCollum|first2=Catherine D.|last3=Fox|first3=David B.|date=2018-04-07|title=Cyber Threat Modeling: Survey, Assessment, and Representative Framework|url=https://apps.dtic.mil/sti/citations/AD1108051|archive-url=https://web.archive.org/web/20210929040958/https://apps.dtic.mil/sti/citations/AD1108051|url-status=live|archive-date=September 29, 2021|language=en}}</ref> Threat modeling is the process of creating and applying mock situations where an attacker could be trying to maliciously access data in [[cyberspace]]. By doing this, various profiles of potential attackers are created, including their intentions, and a catalog of potential vulnerabilities are created for the respective organization to fix before a real threat arises.<ref>{{Cite web|title=Threat Modeling: 12 Available Methods|url=https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/|access-date=2021-10-04|website=SEI Blog|date=2 December 2018 |language=en}}</ref> Threat modeling covers a wide aspect of cyberspace, including devices, applications, systems, networks, or enterprises. Cyber threat modeling can inform organizations with their efforts pertaining to cybersecurity in the following ways:<ref>{{Cite book|last=Jones|first=Andy
* Risk Management
|