Skip to main content

Table 1 Collected data and the different methods used for collecting the data. For each data source a separate data source specific adapter is created to parse the data

From: Automating threat modeling using an ontology framework

Source

Method

Data description

Windows 2012 Server

Powershell cmdlet

Installed software

Red Hat Enterprise Linux 7

yum list

Installed software

Nessus

Scanning

Vulnerability data, operating system names

Nexpose

Scanning

Vulnerability data, operating system names

Nmap

Scanning

Service names, operating system names

p0f

Passive capture

Data flows, operating system names

Wireshark

Passive capture

Data flows