Threat Model - Approaches To Threat Modeling

Approaches To Threat Modeling

There are at least three general approaches to threat modeling:

Attacker-centric
Attacker-centric threat modeling starts with an attacker, and evaluates their goals, and how they might achieve them. Attacker's motivations are often considered, for example, "The NSA wants to read this email," or "Jon wants to copy this DVD and share it with his friends." This approach usually starts from either entry points or assets.
Software-centric
Software-centric threat modeling (also called 'system-centric,' 'design-centric,' or 'architecture-centric') starts from the design of the system, and attempts to step through a model of the system, looking for types of attacks against each element of the model. This approach is used in threat modeling in Microsoft's Security Development Lifecycle.
Asset-centric
Asset-centric threat modeling involves starting from assets entrusted to a system, such as a collection of sensitive personal information.

Read more about this topic:  Threat Model

Famous quotes containing the words approaches to, approaches, threat and/or modeling:

    Someone approaches to say his life is ruined
    and to fall down at your feet
    and pound his head upon the sidewalk.
    David Ignatow (b. 1914)

    You should approach Joyce’s Ulysses as the illiterate Baptist preacher approaches the Old Testament: with faith.
    William Faulkner (1897–1962)

    We live under continual threat of two equally fearful, but seemingly opposed, destinies: unremitting banality and inconceivable terror. It is fantasy, served out in large rations by the popular arts, which allows most people to cope with these twin specters.
    Susan Sontag (b. 1933)

    The computer takes up where psychoanalysis left off. It takes the ideas of a decentered self and makes it more concrete by modeling mind as a multiprocessing machine.
    Sherry Turkle (b. 1948)