Next Article in Journal
Data Deduplication System Based on Content-Defined Chunking Using Bytes Pair Frequency Occurrence
Next Article in Special Issue
A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation
Previous Article in Journal
Existence of Three Solutions for a Nonlinear Discrete Boundary Value Problem with ϕc-Laplacian
Previous Article in Special Issue
Towards a Secure Signature Scheme Based on Multimodal Biometric Technology: Application for IOT Blockchain Network
 
 
Article
Peer-Review Record

A Model of Threats to the Confidentiality of Information Processed in Cyberspace Based on the Information Flows Model

Symmetry 2020, 12(11), 1840; https://doi.org/10.3390/sym12111840
by Egoshin N. S., Konev A. A. and Shelupanov A. A. *
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Symmetry 2020, 12(11), 1840; https://doi.org/10.3390/sym12111840
Submission received: 22 September 2020 / Revised: 27 October 2020 / Accepted: 29 October 2020 / Published: 6 November 2020

Round 1

Reviewer 1 Report

This isn't bad.  Some formatting oddness (unsure why you're using a dash as a bullet; your figures are fuzzy), but its readable and presented well.

Minor gripes:

  • Several key references are missing. Odd that you talk about STRIDE and threat modelling but don't mention Adam Shostack's work (who was hugely influential on the development of both), the relevant NIST standards should be talked about too.
  • 4 self citations is borderline inappropriate.

Bigger gripes:

  • Why is this going to a journal on Symmetry?  There isn't anything here about symmetry.  Wouldn't a cybersecurity venue be more appropriate?
  • Your conclusions are wrong.  You complain that STRIDE isn't doesn't coincide with the Parkerian Hexad—but why should it?  There is no consensus that it really brings much beyond the well established CIA model.  You also moan that it isn't clear what STRIDE threats are applicable to.  This is deliberate, and the intention is for the information security specialist to use their own judgement as to what aspects of a system need protection.  The purpose of the framework isn't to state in some formal notation exactly what must happen at every stage, but to frame and give structure to "the human in the loop"'s thought processes and process when developing their threat model. 

    Trying to eradicate that human process, trying to automate the identification of threats in a purely mathematically is doomed to failure: its impossible to specify everything and a changing threat landscape means your model is out of date as soon as you start. (see Moritz Y Becker's PhD thesis for an example of just how information flows get out of control rapidly).

That said, your model (whilst not being particularly different) seems sane enough, and it's a good read.

Author Response

Hello!

Thank you very much for remarks.

If you do not mind, I decided two create one general article for to reviewers.

I tried to highlight all of my fixes and expect that you will find all responses for your questions in attachment file.

 

 

Author Response File: Author Response.docx

Reviewer 2 Report

The work presents an interesting approach to the computer threats. Undoubtedly, this is a very important topic, especially now that the internet is present in every place and on any device. Language is correct, figures and tables are readable and intuitive.

The STRIDE model presented at work promises to be very good. However, there is no direct use of the model, which is probably not possible at this stage of the study. The authors emphasize the high level of abstraction, which is true. It is difficult to propose new elements of the model at this level of abstraction. I think the direct use of the model will force its expansion.

  • Comments to which you should correct or add a few words:
    Please correct the summary. The summary currently describes the chapters (this may be at the end of the first chapter). The summary should contain a description of the studies, not a description of the structure of the article.
  • Please correct words: ofHidden Markov - a lack of space.
  • Captions of tables 2-9, there are large digits, there should be lower indices.

Author Response

Hello!

Thank you very much for remarks.

If you do not mind, I decided two create one general article for to reviewers.

I tried to highlight all of my fixes and expect that you will find all responses for your questions in attachment file.

Author Response File: Author Response.docx

Back to TopTop