官术网_书友最值得收藏!

Threat modeling

Once you have gathered information in the intelligence-gathering phase, you start working on threat modeling. In threat modelling, you begin to create a structure of threats and how they relate to your target's environment. For example, you will identify systems that hold valuable information, then you will identify the threats that pertain to the systems and what vulnerabilities exist in the system that can allow the attacker to act on the threat.

Threat modeling has a few methodologies, such as the following:

  • Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege (STRIDE)
  • Process for Attack Simulation and Threat Analysis (PASTA)
  • Visual Agile and Simple Threat Modelling (VAST)

There are few tools that you can leverage for threat modeling; the most common being the following two:

主站蜘蛛池模板: 安乡县| 荔波县| 开封市| 三门县| 大方县| 峨边| 明星| 长治县| 巴彦县| 陵川县| 洛浦县| 平谷区| 陇西县| 乡城县| 廉江市| 马鞍山市| 精河县| 建始县| 柳河县| 石台县| 溧阳市| 崇阳县| 渝北区| 体育| 贵定县| 玛曲县| 浮山县| 阿鲁科尔沁旗| 彰武县| 义马市| 聂荣县| 江西省| 奇台县| 界首市| 岳普湖县| 武汉市| 紫阳县| 德兴市| 洛南县| 原平市| 宣威市|