One Article Review

Accueil - L'article:
Source CSO.webp CSO
Identifiant 1656103
Date de publication 2020-04-15 03:00:00 (vue: 2020-04-15 11:00:53)
Titre Threat modeling explained: A process for anticipating cyber attacks
Texte Threat modeling definition Threat modeling is a structured process through which IT pros can identify potential security threats and vulnerabilities, quantify the seriousness of each, and prioritize techniques to mitigate attack and protect IT resources.This broad definition may just sound like the job description of a cybersecurity professional, but the important thing about a threat model is that it is systematic and structured. Threat modelers walk through a series of concrete steps in order to fully understand the environment they're trying to secure and identify vulnerabilities and potential attackers.That said, threat modeling is still in some ways an art as much as a science, and there is no single canonical threat modeling process. The practice of threat modeling draws from various earlier security practices, most notably the idea of "attack trees" that were developed in the 1990s. In 1999, Microsoft employees Loren Kohnfelder and Praerit Garg circulated a document within the company called "The Threats to Our Products" that is considered by many to be the first definitive description of threat modeling.
Envoyé Oui
Condensat 1990s 1999 about anticipating art article attack attackers attacks broad but called can canonical circulated click company concrete considered cyber cybersecurity definition definitive description developed document draws each earlier employees environment explained: first from full fully garg here idea identify important job just kohnfelder like loren many may microsoft mitigate model modelers modeling most much notably order please potential practice practices praerit prioritize process products professional pros protect quantify read resources said science secure security series seriousness single some sound steps structured systematic techniques they thing threat threats through trees trying understand various vulnerabilities walk ways which within
Tags Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: