Skip to main content

Table 1 Collected data and the different methods used for collecting the data. For each data source a separate data source specific adapter is created to parse the data

From: Automating threat modeling using an ontology framework

Source Method Data description
Windows 2012 Server Powershell cmdlet Installed software
Red Hat Enterprise Linux 7 yum list Installed software
Nessus Scanning Vulnerability data, operating system names
Nexpose Scanning Vulnerability data, operating system names
Nmap Scanning Service names, operating system names
p0f Passive capture Data flows, operating system names
Wireshark Passive capture Data flows