-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Threat Modeling Best Practices
By :
Organizations enumerate and classify their assets to understand the landscape of their technology. Put plainly, organizations will build their list of assets so that they know what they have, where they are, and the level of classification of those assets. This process of enumeration enables enhanced security management by allowing organizations to not only identify vulnerabilities but also know what the impact of those vulnerabilities is on the assets they have. Knowing the specific hardware, software, and physical and digital resources (as well as the versions of those assets) ensures a more informed approach to applying security controls, leading to better implementation of mitigation strategies.
It will come as no surprise that it also enhances incident response by ensuring that the organization knows and can locate affected assets while assessing the impact of security incidents on them. Those of you who were in the cybersecurity space...
Change the font size
Change margin width
Change background colour