Advanced Security Threat Modelling for Blockchain-Based FinTech Applications

04/05/2023
by   Serhan W. Bahar, et al.
0

Cybersecurity threats and vulnerabilities continue to grow in number and complexity, presenting an increasing challenge for organizations worldwide. Organizations use threat modelling and bug bounty programs to address these threats, which often operate independently. In this paper, we propose a Metric-Based Feedback Methodology (MBFM) that integrates bug bounty programs with threat modelling to improve the overall security posture of an organization. By analyzing and categorizing vulnerability data, the methodology enables identifying root causes and refining threat models to prioritize security efforts more effectively. The paper outlines the proposed methodology and its assumptions and provides a foundation for future research to develop the methodology into a versatile framework. Further research should focus on automating the process, integrating additional security testing approaches, and leveraging machine learning algorithms for vulnerability prediction and team-specific recommendations.

READ FULL TEXT
research
01/28/2023

The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox

Recently, bug-bounty programs have gained popularity and become a signif...
research
01/11/2019

How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations

An increasing number of cybersecurity incidents prompts organizations to...
research
05/25/2020

Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities

Insider threats, as one type of the most challenging threats in cyberspa...
research
06/29/2022

Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations

Identification of cyber threats is one of the essential tasks for securi...
research
08/02/2022

A replication of a controlled experiment with two STRIDE variants

To avoid costly security patching after software deployment, security-by...
research
06/27/2020

Domain Name System Security and Privacy: A Contemporary Survey

The domain name system (DNS) is one of the most important components of ...
research
06/15/2022

A Continuous Risk Assessment Methodology for Cloud Infrastructures

Cloud systems are dynamic environments which make it difficult to keep t...

Please sign up or login with your details

Forgot password? Click here to reset