Threats Model for the Security of Personal Data During Their Processing Cover Image

Threats Model for the Security of Personal Data During Their Processing
Threats Model for the Security of Personal Data During Their Processing

Author(s): Serghei Ohrimenco, Svetlana Apachita, Eduard Ryzhkov, Lyudmila Rybalchenko
Subject(s): Economy, Law, Constitution, Jurisprudence, Business Economy / Management, ICT Information and Communications Technologies, EU-Legislation
Published by: Университет за национално и световно стопанство (УНСС)
Keywords: information security; Threats model; ISO standards; computer attack; personal data security
Summary/Abstract: The article describes the main steps to form a model of threats to the security of personal data during their processing in information systems. Particular attention is paid to the deliberate actions of the violator, which lead to damage to the interests of the individual, society and the state. The results of the analysis of existing methods and standards are presented, including: ISO 27005-2022, The STRIDE Threat Model, NIST Special Publication 800-37. The hierarchical intruder model is described as one of the sources of threats along with malware carriers and bookmarks, the definition and description of attack channels.

Toggle Accessibility Mode