close
test_template

Threat Modeling

Human-Written
download print

About this sample

About this sample

close
Human-Written

Words: 377 |

Page: 1|

2 min read

Published: Sep 20, 2018

Words: 377|Page: 1|2 min read

Published: Sep 20, 2018

Threat modeling should be carried more often because new threats emerge now and then. This process should be iterative and should begin during the early design phases of an application and go on throughout the life cycle application.

This is due to two reasons.

  • The first one is that it is impossible to recognize all potential threats in a single given time.
  • The second reason is because the applications are unusually fixed and they must therefore be adapted and enhanced to suit the changing the requirements of a business.

As an application evolves the threat modeling process should be carried out in a repeated manner. The threat modeling process is carried out in a six-phase process namely:

This involves identifying the valuable assets that must be protected by the system. The asset centric approach entails classifying the assets of a company entrusted to a software or system i.e. the data the system or software processes. The assets are categorized in regards to data sensitivity and the inherent value they have to potential attackers. This helps in prioritizing the risk levels.

This stage involves documenting the functions of an application. It also forms parts of the solution which involve the physical and architecture deployment technologies and configuration. One should identify the potential vulnerabilities in the implementation or design of an application.

This involves decomposing the application’s architecture including the underlying host and network infrastructure design with the aim of creating an application’s security profile. The objective of the security profile is uncovering the vulnerabilities in the deployment, implementation or design configuration of the application.

This step involves having the aims of an attacker in mind, having the knowledge of the potential vulnerabilities and architecture of an application and recognizing the potential threats that can affect an application.

This stage involves documenting all the threats using an ordinary threat template that describes a set of attributes for the identified threats.

This involves prioritizing the most critical threats and addressing them first. The rating process involves comparing the threat’s probability and the damage it might cause.

Get a custom paper now from our expert writers.

  1. Identifying assets.
  2. Creating an architecture overview.
  3. Decomposing the application.
  4. Identifying the threats.
  5. Documenting the threats.
  6. Rating the threats.

Conclusion

The threat modeling process output us a document of the IT project team members. It helps them in clearly understanding the threats that are required to be addressed and how that should be carried out.

Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

Threat Modeling. (2018, September 04). GradesFixer. Retrieved November 19, 2024, from https://gradesfixer.com/free-essay-examples/threat-modeling-2/
“Threat Modeling.” GradesFixer, 04 Sept. 2018, gradesfixer.com/free-essay-examples/threat-modeling-2/
Threat Modeling. [online]. Available at: <https://gradesfixer.com/free-essay-examples/threat-modeling-2/> [Accessed 19 Nov. 2024].
Threat Modeling [Internet]. GradesFixer. 2018 Sept 04 [cited 2024 Nov 19]. Available from: https://gradesfixer.com/free-essay-examples/threat-modeling-2/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now