Access your Pro+ Content below.
The Value of Threat Modelling
Sponsored by ComputerWeekly.com
This article in our Royal Holloway information security thesis series gives an overview of the value of threat modelling and describes some common modelling techniques.
Table Of Contents
- Threat modelling covers a variety of powerful techniques for understanding the underlying causes of risks, and identifying and understanding the threats facing organisations enables earlier and more complete risk mitigation
- The shared aim of most threat modelling techniques is to facilitate rapid, cost-effective exploration of leading indicators of future risks, allowing appropriate risk mitigation resources to be assigned in a timely manner
- Threat modelling should be performed actively throughout the development lifecycle of systems and software, as even the best threat models are subject to errors and omissions, to best protect businesses and their users
Access this CW+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.