filmov
tv
What is Threat Modeling and Why Is It Important?

Показать описание
In this video, Keith Barker covers threat modeling. He’ll dig into what it is, some of the main processes it involves, and then outline why it’s important. You’ll learn about the three primary approaches to threat modeling, how they’re different, and then decide which is the best for your case.
Threat modeling involves identifying potential (or real) vulnerabilities, then putting countermeasures and controls in place so that those vulnerabilities are not exploited. There are several different approaches we can use when engaging in threat modeling.
First, we can look at it from the attacker’s perspective, seeking to understand their goals and abilities, then reverse engineer protective measures. Second, we could look at things from an architecture perspective, digging into our web servers, email servers, routers, and switches. With this approach, we would identify weaknesses and then create defensive measures.
Finally, we can look at threat modeling from an asset perspective: what do we have, what are we trying to protect, and how is it vulnerable? This prioritizes what we need to defend.
Start learning with CBT Nuggets:
Комментарии