-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Threat Modeling Best Practices
By :
We are surrounded by connected devices. They are in our homes, in our offices, on a factory floor, or in our pockets. Each device can interact with our physical world or connect us to people thousands of miles away. The power and opportunity of these devices are immense, but they can also bring a widened threat surface to an organization. In this chapter, we’ll explore the unique security challenges introduced by Internet of Things (IoT) and mobile devices, particularly in complex environments where IT meets OT.
From smart factories and hospitals to agricultural fields and remote industrial deployments, these devices often serve as critical components while simultaneously being a potential weak point in modern infrastructure. We’ll examine how adversary modeling can sharpen our understanding of real-world threats, delve into the distinct risk profiles of mobile and IoT systems, and learn how to use threat modeling outputs to drive the...
Change the font size
Change margin width
Change background colour