Premium Content

Access "Threat modeling follows attack tree as enterprise protection practice"

Published: 13 Dec 2012

The time has come to shed our reactionary "yesterday's threat" mentality and start thinking ahead and planning for what's to come. Enter threat modeling. Threat modeling is the logical and systematic evaluation of every avenue of approach. You can then prioritize each avenue's relative "threat level" based on factors such as the value of the target asset, likelihood of success and cost of attack. Threat modeling is the "show me" side of security derived from increasing C-suite skepticism regarding threats brought about by the overly restrictive recommendations of paranoid security pros. It forces auditors and architects to define more specifically what it would take to compromise a system. Threat modeling has its roots in concepts like Bruce Schneier's attack trees, Peter Tippett's synergistic controls, Marcus Ranum's zones of risk and every strategic military defensive exercise for the past 5,000 years. These are logical approaches to identifying unique attack points to understand where the risk is and how to defend against it. A handful of solutions aim to... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free