THREATS AND COUNTERMEASURES SCHEMA
First Claim
1. A system that facilitates leveraging knowledge into development of an application, comprising:
- an schema generation component that incorporates expertise into threats and countermeasures schema; and
an application engineering component that executes an engineering activity based at least in part upon the threats and countermeasures schema.
2 Assignments
0 Petitions
Accused Products
Abstract
An threats and countermeasures schema that can incorporate expertise into an application engineering activity is provided. For example, a threats and countermeasures schema can be applied to a threat modeling component to converge knowledge into the activity by identifying categories, vulnerabilities, attacks and countermeasures based upon an application type, user objective, etc. The novel threats and countermeasures schema can create a common framework that converges knowledge with respect to any application engineering activity (e.g. threat modeling). For example, the schema can include lists of threats and attacks that can be acted upon. As well, the framework can include a list of novel countermeasures based upon the attacks. Additionally, a context precision mechanism can be employed to automatically and/or dynamically determine a context of an application environment. This context can be used to automatically generate an appropriate schema based upon the determined application type.
-
Citations
20 Claims
-
1. A system that facilitates leveraging knowledge into development of an application, comprising:
-
an schema generation component that incorporates expertise into threats and countermeasures schema; and
an application engineering component that executes an engineering activity based at least in part upon the threats and countermeasures schema. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method of engineering an application, comprising:
-
generating a threats and countermeasures schema; and
executing an application engineering activity based at least in part upon the threats and countermeasures schema. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-executable system that facilitates leveraging knowledge into engineering of an application, comprising:
-
means for identifying a context of the application;
means for identifying a threats and countermeasures schema based at least in part upon the context; and
means for performing an application engineering activity based at least in part upon the threats and countermeasures schema. - View Dependent Claims (17, 18, 19, 20)
-
Specification