Digital transformation through effective cybersecurity
  • Digital Transformation
  • Corporate Cybersecurity
  • Security / IT Primer
  • Advisory Services
  • Contact

Threat Modeling

 

What are the threats? 

  • It is important to know what you are trying to protect against
  • And what kind of attacks you are going to ignore

Security based analysis to determine

  • Highest level security risks posed to the product
  • How attacks can manifest themselves

Goals

  • Determine which threat requires mitigation
  • How to mitigate the threats

 

You cannot build a secure system until 

you understand your threats

 

 

Benefits

  • Helps you understand your application better
  • Helps you find bugs
  • Helps you find complex design bugs not likely found in any other way
  • Help new team members understand the application in detail
  • Should be read by other product teams that build on your product
  • Testers can test against threat model

Categorizing Threats

 

DREAD

  • Damage potential
  • Reproducibility
  • Exploitability
  • Affected Users
  • Discoverability

OCTAVE

  • Operationally 
  • Critical 
  • Threat
  • Asset
  • Vulnerability
  • Evaluation

STRIDE

  • Spoofing identity
  • Tampering with data
  • Repudiation
  • Information disclosure
  • Denial of service
  • Elevation of privilege


Threats Analysis

 

Threat Factors

  1. Existence
  2. Capabilities
  3. Intentions
  4. History
  5. Targeting

Threat Level

  • Critical (Factors 1,2,5 present)
  • High (1,2,3,4 present)
  • Medium (1,2,4 present)
  • Low (1,2 present)
  • Negligible (1 and/or 2 may be present)


Let us help you change your mindset and address cybersecurity

Cybersecurity
  • General Security Concepts
  • Aspects of Cybersecurity
  • People and Cybersecurity
  • Defender vs. Attacker
  • Complexity vs. Security
  • Resilience vs. Reliability
  • Cyber Hygiene
  • Testing
  • Threats Modeling
  • Traditional vs. IT Domains
  • Traditional vs. IT / Security Engineering
  • What is PCI DSS?
  • Cyber Insurance
  • 5G
  • Aviation
Tweets by intecur
About | Privacy Policy | Cookie Policy | Sitemap
Intecur, Inc. Copyright © 2020 All Rights Reserved.
Log in Log out | Edit
  • Digital Transformation
    • Digital Transformation - Definition
    • The Reality
    • The New Global "M's"
    • Global Trends
    • COVID-19
    • Issues & Challenges
    • Strategy
    • What Stage is Your Organization?
  • Corporate Cybersecurity
    • Cybersecurity Today
    • Corporations
    • Executives
    • Compliance
    • Benefits
    • Strategy
    • Security by Design
  • Security / IT Primer
    • General Security Concepts
    • Aspects of Cybersecurity
    • People and Cybersecurity
    • Defender vs. Attacker
    • Complexity vs. Security
    • Resilience vs. Reliability
    • Cyber Hygiene
    • Testing
    • Threats Modeling
    • Traditional vs. IT Domains
    • Traditional vs. IT / Security Engineering
    • What is PCI DSS?
      • PCI Levels
      • PCI Compliance
    • Cyber Insurance
      • Coverage
      • Qualities
    • 5G
    • Aviation
      • Aviation Systems
      • Aviation Networks
  • Advisory Services
    • CISO-as-a-Service
    • Experience
    • Acronym Glossary
  • Contact
    • About Us
    • Partner Login
  • Scroll to top
Close