How does threat modeling differ between roles in it

Assignment Help Computer Engineering
Reference no: EM133627000

Question: Threat modeling is an important process to help identify deficiencies in systems that are meant to keep assets secure. Using a framework like the Howard Threat Model while summarizing the attack provides an industry vetted model that allows for easy identification of incidents versus threats. Every cyber incident can be depicted in threat modeling scenarios, which provides an industry standard to communicate the characteristics of any threat. Threat modeling is an important practice for cybersecurity analysts because they must compare different forms of threats to identify common characteristics and build the most secure defense against threats. This activity will draw on important fundamentals we have explored previously, like the confidentiality, integrity, and availability (CIA) triad and adversarial mindset.

This activity relates directly to the final project, where you will be required to complete a threat model for your project scenario. Take advantage of feedback on this assignment to prepare you for your final project submission in Module Seven.

Prompt

Analyze the three breach case studies found in the three articles that are linked in the Reading and Resources section of Module Three of your course. Use this information to fill out the template and address the critical elements listed below.

Threat Modeling
To complet this assignment, first download the Stepping Stone One Template from the Stepping Stone assignment in Module Three of your course. Identify the elements of the Howard Threat Model by filling in the template for the case studies below.
Complete column for Target Breach thoroughly and accurately
Complete column for Sony Breach thoroughly and accurately
Complete column for OPM Breach thoroughly and accurately
Incident Analysis
Select one of the incidents from the table and analyze the following:
Which of the CIA triad is most applicable to the "Action" category of the selected incident? Explain your answer.
How can you use an adversarial mindset in analyzing the "Attackers" and "Objective" to inform the response to the attack?
Imagine you worked for the organization in the chosen incident and had used a threat model proactively. What changes could you have made to the organization to avoid the incident?
Threat Modeling Extension
Defend the need for performing threat modeling. How would you convince your supervisor that threat modeling is worth the time and resources needed to complete it?
Why is threat modeling an important tool for a security practitioner?
What organizational advantages beyond security controls might arise from this threat modeling exercise?
How does threat modeling differ between roles in IT (for example, testers-data mutations; designers-analyzing threats; developers-tracking data flow)?

Reference no: EM133627000

Questions Cloud

What human resources management activity : For the companies participating in this foundation, this is a form of what human resources management (HRM) activity?
How can i extend on information about this post : HORIS that are packed with sensors so they can relay the most up-to-date information down to the users. How can I extend on information about this post
Write a memo regarding improvement on professor teaching way : Write a bad news memo regarding improvements on Professor teaching way. Please use OABC and 5W2H format.
Vitamin and mineral supplement : How do the suggested intakes of the vitamins and minerals in the supplement compare with the current DRIs for these nutrients?
How does threat modeling differ between roles in it : How does threat modeling differ between roles in IT (for example, testers-data mutations; designers-analyzing threats; developers-tracking data flow)
What can you use to add dragging and dropping : What can you use to add dragging and dropping, resizing, and sorting methods to your web pages, as well as more animations and effects, animated color
Explain briefly and provide valid references : what happened, how much information was taken, the steps to remedy it, and the fallout. Please explain briefly and provide valid references
Calculate the takt time for the provided system data : To deliver the products to customer, there are four processes to go through in sequential manner. Calculate the Takt time for the provided system data.
Explain confirmation bias-egocentrism : Explain confirmation bias, egocentrism, and sociocentrism in regards to writing preparation.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe the complex email system

Describe the complex email system located on slide 12 from the slide deck from week 6 titled "Example of a Complex Hybrid System." (It is also attached).

  Perform non-maximal suppression along the gradient direction

Write a functionin opencv,my_non_maximal_suppression(magnitude, orientation, tl), to perform non-maximal suppression along the gradient direction.

  Write a program that looks at all the command line arguments

Write a program that looks at all the command line arguments and reports if any of the arguments are the same (i.e., they match exactly).

  How can a linux distro increase its user base

How can a Linux distro increase its user base? Building on our discussion from before let's talk about some individual distributions...If you ask someone

  Write a definition for a structure type for records

Write a definition for a structure type for records consisting of a person's wage rate, accrued vacation (which is some whole number of days) and status.

  Discuss a criterion that you are proposing to be used

Discuss a criterion that you are proposing to be used to assess which algorithm is to be used for a given scenario. Construct a flowchart that can be used

  Solve problem of two devices generat simultaneous interrupts

What must be done to solve the problem of two devices generating simultaneous interrupts in a system with polled interrupts?

  What tools are instrumental in monitoring

What tools are instrumental in monitoring, detecting, and alerting your company when an someone is trying to gain unauthorized access to your organizations.

  Research advantages of using a database management system

Research advantages of using a database management system. List two advantages do you think are the most important? Why? Give an example of a database

  Explain any potential ethical issues that could arise

Assignment: SYSTEMS ANALYSIS AND DEVELOPMENT- Identify and describe any potential ethical issues that could arise in connection with the new architecture.

  Why an organization may choose to implement an hris

Discuss three reasons why an organization may choose to implement an HRIS

  Prompt the user for some information abou a car trip

Write a simple C program that prompts the user for some information abou a car trip and then calculates some values based on what's entered.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd