Week 3 Discussion – Threat Modeling

Apr 3, 2024

Get all Your Education Homework help from Tutorslite.com

Week 3 Discussion – Threat Modeling

Don't use plagiarized sources. Get Your Custom Essay on
Week 3 Discussion – Threat Modeling
Just from $13/Page
Order Essay

Threat modeling is the process used to identify security requirements by reviewing a diagram of the information technology architecture. The threat surface is the sum total of all the ways a threat can cross the boundary.

In this discussion post, you will use threat modeling to secure your residence.

Please respond to the following in a post of  words:

Address each of these threat modeling steps to secure your residential system:

  • Step 1: Identify security objectives.
  • Step 2: Identify assets and external dependencies.
  • Step 3: Identify trust zones.
  • Step 4: Identify potential threats and vulnerabilities.
  • Step 5: Document your threat model.

Note:

  • In your post, be sure to explain how physical, logical, and administrative aspects of threats may interact.
  • Remember to cite any sources you use, including your textbook, using the Strayer Writing Standards format.

Recent Posts

Open chat
Hello
Can we help you?