官术网_书友最值得收藏!

Threat modeling

Once you have gathered information in the intelligence-gathering phase, you start working on threat modeling. In threat modelling, you begin to create a structure of threats and how they relate to your target's environment. For example, you will identify systems that hold valuable information, then you will identify the threats that pertain to the systems and what vulnerabilities exist in the system that can allow the attacker to act on the threat.

Threat modeling has a few methodologies, such as the following:

  • Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege (STRIDE)
  • Process for Attack Simulation and Threat Analysis (PASTA)
  • Visual Agile and Simple Threat Modelling (VAST)

There are few tools that you can leverage for threat modeling; the most common being the following two:

主站蜘蛛池模板: 历史| 林芝县| 上蔡县| 五河县| 偃师市| 海宁市| 双牌县| 长岛县| 连云港市| 扶绥县| 南安市| 宁德市| 凉山| 惠安县| 德钦县| 伊川县| 阳原县| 磐石市| 东安县| 临洮县| 会昌县| 石阡县| 阜宁县| 从江县| 彩票| 平原县| 工布江达县| 施甸县| 驻马店市| 商南县| 五家渠市| 梅河口市| 福州市| 武胜县| 宝兴县| 榕江县| 垦利县| 饶河县| 巩义市| 沙河市| 广丰县|