International Peer Reviewed & Refereed Journals, Open Access Journal
ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15

Issue: September 2023

Volume 8 | Issue 9

Impact factor: 8.15

Click Here For more Info

Imp Links for Author
Imp Links for Reviewer
Research Area
Subscribe IJSDR
Visitor Counter

Copyright Infringement Claims
Indexing Partner
Published Paper Details
Paper Title: Case Study and Implementation of Threat Modelling using MTT
Authors Name: Kotni Bangaru Krishnaveni , D.Lalitha Bhaskari
Unique Id: IJSDR2309026
Published In: Volume 8 Issue 9, September-2023
Abstract: Any IT company deals with the creation and deployment of web applications. In this era when cybercrime has grown to be a serious menace. Threat Modelling (TM) is one of the key strategies for solving this issue. Threat modelling is locating and disseminating information regarding the dangers that could affect a specific system, network, or application. In this paper provides comprehensive view of threat modelling, TM approaches, and the many tools that are accessible. To create secure web applications, using Microsoft Threat Taxonomy (MTT) tool implements stride methodology. The STRIDE method is a popular one for threat modelling.it stands for spoofing, tampering, repudiation, information disclosure, denial of service, elevation of privilege. It examines the value of threat modelling in the current cybersecurity environment and how it aids businesses in identifying and addressing possible threats. For a secure design of online applications, MTT explains the approach to identify threats, threat boundaries, and mitigation actions. This essay serves as a case study for the application of the stride technique to MTT, outlining the procedures followed, the difficulties encountered, and the results obtained. The case study's conclusions and recommendations are explored, along with the best practices for efficient threat modelling. Overall, the goal of this work is to further the field of exploratory data analytics by offering suggestions and helpful advice on how to integrate threat modelling into the software development cycle. By doing this, the MTT tool's security was improved, guaranteeing that the necessary defences were put in place to lessen the threats that were discovered.
Keywords: Threat Modelling, STRIDE methodology, MTT tool, security, vulnerabilities, threats.
Cite Article: "Case Study and Implementation of Threat Modelling using MTT", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.8, Issue 9, page no.176 - 185, September-2023, Available :http://www.ijsdr.org/papers/IJSDR2309026.pdf
Downloads: 000251437
Publication Details: Published Paper ID: IJSDR2309026
Registration ID:208477
Published In: Volume 8 Issue 9, September-2023
DOI (Digital Object Identifier):
Page No: 176 - 185
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631

Click Here to Download This Article

Article Preview

Click here for Article Preview

Major Indexing from www.ijsdr.org
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager Academia.edu
arXiv.org : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

Track Paper
Important Links
Conference Proposal
DOI (A digital object identifier)

Providing A digital object identifier by DOI
How to GET DOI and Hard Copy Related
Open Access License Policy
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Creative Commons License
This material is Open Knowledge
This material is Open Data
This material is Open Content
Social Media

Indexing Partner