What is Threat Modeling and Why Is It Important?

preview_player
Показать описание

In this video, Keith Barker covers threat modeling. He’ll dig into what it is, some of the main processes it involves, and then outline why it’s important. You’ll learn about the three primary approaches to threat modeling, how they’re different, and then decide which is the best for your case.

Threat modeling involves identifying potential (or real) vulnerabilities, then putting countermeasures and controls in place so that those vulnerabilities are not exploited. There are several different approaches we can use when engaging in threat modeling.

First, we can look at it from the attacker’s perspective, seeking to understand their goals and abilities, then reverse engineer protective measures. Second, we could look at things from an architecture perspective, digging into our web servers, email servers, routers, and switches. With this approach, we would identify weaknesses and then create defensive measures.

Finally, we can look at threat modeling from an asset perspective: what do we have, what are we trying to protect, and how is it vulnerable? This prioritizes what we need to defend.

Start learning with CBT Nuggets:

Рекомендации по теме
Комментарии
Автор

extremely helpful!! loved the diagrams & visuals - thank you!!

itskrit
Автор

Great video with lots of information. Thank you!

mkang
Автор

Thanks for this informative video session.

Papaji-sory
Автор

Quality content and nice clear audio. What kind of mic are you using?

olivernichols
Автор

what tool are you using to enable pencil markup of your visuals?

myusrn
Автор

Am I the only person that thinks threat maps are ridiculous

chrisadams