ASU Threat Modeling Discussion

User Generated


Computer Science

American Sentinel University


Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please view explanation and answer below.Thank you for trusting me with your work. I can do more than that if you trust me with more. kindly review the work and give me a positive review and a tip if possible. thank you in advance.


Threat Modeling

Students Name
Institutional Affiliation
Due date


Threat Modeling
Threat modeling is a strategy used to control and evaluate risks. It identifies potential
threats and develops procedures or tests to detect and respond to those threats. The process
involves understanding how threats impact systems and applying appropriate measures to
counter them. Threat modeling helps security teams to prioritize threats and ensure that resources
and attention are effectively distributed; thus, it can be prioritized during the planning and
implementation of security to make sure solutions are effective (Ofori & Islam, 2019). Threat
modeling can help the security team ensure that their protections align with any threat that
evolves. That is possible when threat modeling is done routinely. It is also advantageous when
adopting new software's since it helps the team understand how tools and applications are
exposed to threats compared to the protection offered. Threat modeling helps understand where
security is lacking when adapting tools. Below are common security risks.
We have come across or been told about computer viruses, and I am sure we all fear
them. They are one of the most common threats and are rated high, with approximately 33% of
household computers affected. They are pieces of software designed and spread from one
computer to the other. Mostly they com...

I was having a hard time with this subject, and this was a great help.


Related Tags