Threat modeling should be done more often because new threats emerge from time to time. This process should be iterative and should begin during the early design stages of an application and continue throughout the application lifecycle. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay This is due to two reasons. The first is that it is impossible to recognize all potential threats at once. The second reason is because applications are unusually fixed and therefore need to be adapted and improved to meet the changing needs of a business. As an application evolves, the threat modeling process should be performed repeatedly. The threat modeling process is carried out in a six-step process, namely: This involves identifying the valuable assets that need to be protected by the system. The asset centric approach involves the classification of a company's assets entrusted to a software or system, i.e. the data that the system or software processes. Assets are classified based on the sensitivity of the data and the intrinsic value it has for potential attackers. This helps prioritize risk levels. This phase involves documenting the functions of an application. It also constitutes parts of the solution involving physical and architectural deployment and configuration technologies. You need to identify potential vulnerabilities in the implementation or design of an application. This involves breaking down the application architecture, including the design of the underlying host and network infrastructure, with the goal of creating a security profile of the application. The goal of the security profile is to discover vulnerabilities in the deployment, implementation, or configuration of the application design. This phase involves having an attacker's goals in mind, having knowledge of potential vulnerabilities and an application's architecture, and recognizing potential threats that can affect an application. This phase involves documenting all threats using a standard threat model that describes a set of attributes for the identified threats. This involves prioritizing the most critical threats and addressing them first. The assessment process involves comparing the likelihood of the threat against the damage it could cause. Please note: this is just an example. Get a customized paper from our expert writers now. Get a Custom Essay Identifying Resources. Creating an architecture overview. Application breakdown. Threat identification. Threat documentation. Threat assessment. ConclusionThe threat modeling process produced us a document from the IT project team members. It helps them clearly understand the threats that need to be addressed and how to do so.
tags