Abstract: For many years the growing intricacy of modern systems demands effective threat modeling strategies, as the systems are faced with cyber security threat that impedes system’s performance, compromise sensitive data, facilitate malware propagation, enable unauthorized access, trigger data breaches, etc. This paper explores the role of Object-Oriented Programming (OOP) techniques in modeling cyber security threats, providing a comprehensive....
Index Terms – Cyber security, Cyber threats, Modeling, Object-Oriented Programming (OOP), Security modeling
[1].
Cyber security and Infrastructure Security Agency. (2020). Threat Modeling.
[2].
Davis, D. (2018). Oriented Programming for Cyber Security: A Survey. Journal of Cyber Security Technology, 4(2), 1-15.
[3].
Gamma, E., Helm, R., Johnson, R. E., & Vlissides, J. M. (1995). Design patterns: Elements of reusable object-oriented software. Addison-Wesley Longman Publishing Co., Inc.
[4].
International Association for Machine Learning and Artificial Intelligence. (2020). Threat Modeling for AI Systems.
[5].
J. Smith, "Applying Object-Oriented Programming to Cyber Security Threat Modeling," Journal of Cyber Security, vol. 10, no. 3, pp. 123-135, 2020