CW+ Premium Content/E-Handbooks

Thank you for joining!
Access your Pro+ Content below.
March 2016

The Value of Threat Modelling

Sponsored by ComputerWeekly.com

This article in our Royal Holloway information security thesis series gives an overview of the value of threat modelling and describes some common modelling techniques.

Table Of Contents

  • Threat modelling covers a variety of powerful techniques for understanding the underlying causes of risks, and identifying and understanding the threats facing organisations enables earlier and more complete risk mitigation
  • The shared aim of most threat modelling techniques is to facilitate rapid, cost-effective exploration of leading indicators of future risks, allowing appropriate risk mitigation resources to be assigned in a timely manner
  • Threat modelling should be performed actively throughout the development lifecycle of systems and software, as even the best threat models are subject to errors and omissions, to best protect businesses and their users

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close