The article provides an analysis of techniques and approaches for modeling information security threats using the example of proactive search for threats that are not detected by traditional means of ensuring information security. The main stages and processes of the threat hunting method based on the basic maturity model 'Hunting Maturity Model' are considered. In addition, the MITRE ATT&CK framework is briefly reviewed using the example of 'technological domains' with a group classification of related actions, including when implementing targeted attacks on critical information infrastructure objects. The article concludes with a brief comparative review of information security threat modeling using the methodology of the Federal Service for Technical and Export Control of Russia (FSTEC of Russia) and MITRE ATT&CK matrices. In the discussion context, emphasis is placed on considering the possibility of integrating these two techniques for a more practice-oriented approach to modeling information security threats at the stage of creating information security systems and at the stage of its operation.
Original languageEnglish
Title of host publicationProceedings - 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology, USBEREIT 2023
Subtitle of host publicationbook
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages305-308
Number of pages4
ISBN (Electronic)979-835033605-4
DOIs
Publication statusPublished - 15 May 2023
Event2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT) - ИРИТ-РТФ УрФУ, Екатеринбург, Russian Federation
Duration: 15 May 202317 May 2023

Conference

Conference2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT)
Country/TerritoryRussian Federation
CityЕкатеринбург
Period15/05/202317/05/2023

ID: 41994768