官术网_书友最值得收藏!

Threat modeling

Once you have gathered information in the intelligence-gathering phase, you start working on threat modeling. In threat modelling, you begin to create a structure of threats and how they relate to your target's environment. For example, you will identify systems that hold valuable information, then you will identify the threats that pertain to the systems and what vulnerabilities exist in the system that can allow the attacker to act on the threat.

Threat modeling has a few methodologies, such as the following:

  • Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege (STRIDE)
  • Process for Attack Simulation and Threat Analysis (PASTA)
  • Visual Agile and Simple Threat Modelling (VAST)

There are few tools that you can leverage for threat modeling; the most common being the following two:

主站蜘蛛池模板: 凤阳县| 中方县| 内乡县| 凌源市| 兴宁市| 合阳县| 临夏县| 囊谦县| 西吉县| 孝义市| 英吉沙县| 昂仁县| 天柱县| 阳东县| 崇明县| 健康| 安顺市| 白沙| 扶风县| 开平市| 合肥市| 崇文区| 红安县| 杭锦后旗| 兴义市| 芜湖市| 东安县| 剑川县| 辽阳县| 石棉县| 湾仔区| 方城县| 通辽市| 建宁县| 吉林市| 晋江市| 闽清县| 金华市| 桐柏县| 嘉鱼县| 宜昌市|