By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
No need to pay just yet!
About this sample
About this sample
Words: 377 |
Page: 1|
2 min read
Published: Sep 20, 2018
Words: 377|Page: 1|2 min read
Published: Sep 20, 2018
Threat modeling should be carried more often because new threats emerge now and then. This process should be iterative and should begin during the early design phases of an application and go on throughout the life cycle application.
This is due to two reasons.
As an application evolves the threat modeling process should be carried out in a repeated manner. The threat modeling process is carried out in a six-phase process namely:
This involves identifying the valuable assets that must be protected by the system. The asset centric approach entails classifying the assets of a company entrusted to a software or system i.e. the data the system or software processes. The assets are categorized in regards to data sensitivity and the inherent value they have to potential attackers. This helps in prioritizing the risk levels.
This stage involves documenting the functions of an application. It also forms parts of the solution which involve the physical and architecture deployment technologies and configuration. One should identify the potential vulnerabilities in the implementation or design of an application.
This involves decomposing the application’s architecture including the underlying host and network infrastructure design with the aim of creating an application’s security profile. The objective of the security profile is uncovering the vulnerabilities in the deployment, implementation or design configuration of the application.
This step involves having the aims of an attacker in mind, having the knowledge of the potential vulnerabilities and architecture of an application and recognizing the potential threats that can affect an application.
This stage involves documenting all the threats using an ordinary threat template that describes a set of attributes for the identified threats.
This involves prioritizing the most critical threats and addressing them first. The rating process involves comparing the threat’s probability and the damage it might cause.
The threat modeling process output us a document of the IT project team members. It helps them in clearly understanding the threats that are required to be addressed and how that should be carried out.
Browse our vast selection of original essay samples, each expertly formatted and styled