Threat Modelling

Threat Modelling

Few words on Threat Modelling.

Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized.

Steps of threat modeling.

1. Identify the assests.

2. Outline Architecture

3. Breakdown of the applicatioin

4. Identify the threats

5. Classify/Structure the threats

6. Rate the/severaity of the threat

Types of threat modeling:

1. STRIDE

2. DREAD-D

3. VAST

4. TRIKE

5. PASTA

STRIDE

DREAD-D

Feel free to contact me for any clarification on the above…!!!!

You can ping me on https://www.linkedin.com/in/akash-h-c-4a4090a7/

--

--

--

A white hat Hacker...!!!

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Tachyon Protocol Weekly Report #49

The 5 Most Critically Vulnerable Areas in Your Cloud Infrastructure

Loopy Times: November 8, 2021

Preventing account takeovers

Blue Hexagon Security Advisory: Microsoft Exchange Server 0-days

[EN] TryHackMe 25 Days of Cyber Security: Day 7 Walkthrough

AMA Recap: Quick Intro Into Lossless

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Akash Venky

Akash Venky

A white hat Hacker...!!!

More from Medium

Phishing Domain Tool — DnsTwist Part 2

What Is Security Information And Event Management?

Gaining access to a network with Office macros — Pentesting and red teaming

Network Analysis — Ransomware