Discussion and Written Assignment

timer Asked: Jul 6th, 2018
account_balance_wallet $10

Question description

Hello I need help with two tasks below:

Written Assignment:

Taks 1: In approximately 350 words, answer the question below. Follow APA guidelines.

Question: What would you do to influence a culture to begin a threat modeling discipline where threat modeling is not yet practiced?


Task 2: Please write at-least two paragraphs, write discussion on question below. Follow APA guidelines.

Question:Describe experiences where threat modeling helped or would have helped mitigate risks (please do not include specific names of organizations or people).

Note: please mentioned References for both the tasks.

Tutor Answer

School: Purdue University

The file below contains complete work of your assignment. Kindly check.

Running head: Threat Modeling


Threat Modeling
Institution Affiliation

Threat Modeling


Threat modeling
This is a practice of heightening network security through detecting intentions and
weaknesses and then describing mitigation factors to avert or alleviate the regulations that are
likely to be posed by threats in the system. The aim of this practice is to deliver systematic
analysis to the defenders with details of a likely attacker, the most likely attack vectors, and the
assets most desired by an attacker.
Threat modeling drill can be created in a culture where it had never been practiced.A
culture is influenced to carry out a self-evaluationby answering some basic
questions(Shostack,2014). These are such as, what is being worked on, what might go wrong, if
it goes wrong, what can be done about it and finally, was the job commendable at the end.
The best way to answer the question of what is been worked on is by assembling the
system architects, testers, and the security personnel. It is important to include customer advocate
too. This gives them a chance to talk about their tasks and share their different understanding of
the system. At the end of the interaction, they will have been able to come up with a drawing on
a whiteboard on how the system works.
After coming up with a chart on how the system works, then one can isolate where
attacks are likely to occur. In order to navigate the system and determine breaches, these few
factors can be put in place spoofing, interfering, refutation, information leak, repudiation of
service, advancement of privilege. These factors are associated with the system, for example, can
someone tamper with the database? At the one, one is able to come up with lik...

flag Report DMCA

The best tutor out there!!!!

Similar Questions
Hot Questions
Related Tags

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors