Now 81 visitors
Today:555 Yesterday:495
Total: 27790 21S 15P 0R
2024-09-14, Week 37
TACT Journal Homepage
Conference Call for Paper
Author HomePage
Paper Procedure
Paper Submission
Registration Fare
Welcome Message
Statistics & History
Committee
Paper Archives
Outstanding Papers
Conference Proceedings
Presentation Assistant
Travel Information
Photo Gallery
FAQ
Member Login
Scheduler Login
Archives Login
Sponsors


















IEEE/ICACT20220353 Question.9
Questioner: shyoon17@korea.ac.kr    2022-02-16 ¿ÀÈÄ 3:31:14
IEEE/ICACT20220353 Answer.9
Answer by Auhor jongjcho@korea.ac.kr   2022-02-16 ¿ÀÈÄ 3:31:14
It's good to see the authors use STRIDE to model threats. I have some questions. First, I wonder why STRIDE was used among the many threat modeling methods. Second, need to manage risk through the relevant threat modeling, and I am curious about how you proceeded with that part. Third, assuming that risk management was performed, I am curious about how you managed the risk for each risk factor. Fourth, the author did threat modeling for webcam, and I want to know the actual case of the threat to webcam, and I wonder at least one example of how the results are mapped from S, T, R, I, D, and E, respectively. Fifth, I understand that modeling was conducted based on open-source, and I wonder what layer to focus on when creating DFD, how the focused layer distinguishes it from the non-concentrated layer at the low level of DFD and I wonder why the unfocused layer was judged that way.

Select Voice