Approaches To Threat Modeling
There are at least three general approaches to threat modeling:
- Attacker-centric
- Attacker-centric threat modeling starts with an attacker, and evaluates their goals, and how they might achieve them. Attacker's motivations are often considered, for example, "The NSA wants to read this email," or "Jon wants to copy this DVD and share it with his friends." This approach usually starts from either entry points or assets.
- Software-centric
- Software-centric threat modeling (also called 'system-centric,' 'design-centric,' or 'architecture-centric') starts from the design of the system, and attempts to step through a model of the system, looking for types of attacks against each element of the model. This approach is used in threat modeling in Microsoft's Security Development Lifecycle.
- Asset-centric
- Asset-centric threat modeling involves starting from assets entrusted to a system, such as a collection of sensitive personal information.
Read more about this topic: Threat Model
Famous quotes containing the words approaches to, approaches, threat and/or modeling:
“Someone approaches to say his life is ruined
and to fall down at your feet
and pound his head upon the sidewalk.”
—David Ignatow (b. 1914)
“You should approach Joyces Ulysses as the illiterate Baptist preacher approaches the Old Testament: with faith.”
—William Faulkner (18971962)
“We live under continual threat of two equally fearful, but seemingly opposed, destinies: unremitting banality and inconceivable terror. It is fantasy, served out in large rations by the popular arts, which allows most people to cope with these twin specters.”
—Susan Sontag (b. 1933)
“The computer takes up where psychoanalysis left off. It takes the ideas of a decentered self and makes it more concrete by modeling mind as a multiprocessing machine.”
—Sherry Turkle (b. 1948)