Discussion and Written Assignment

Anonymous
timer Asked: Jul 6th, 2018
account_balance_wallet $10

Question description

Hello I need help with two tasks below:

Written Assignment:

Taks 1: In approximately 350 words, answer the question below. Follow APA guidelines.

Question: What would you do to influence a culture to begin a threat modeling discipline where threat modeling is not yet practiced?

Discussion:

Task 2: Please write at-least two paragraphs, write discussion on question below. Follow APA guidelines.

Question:Describe experiences where threat modeling helped or would have helped mitigate risks (please do not include specific names of organizations or people).

Note: please mentioned References for both the tasks.

Tutor Answer

phd.writer
School: Purdue University

The file below contains complete work of your assignment. Kindly check.

Running head: Threat Modeling

1

Threat Modeling
Name
Institution Affiliation

Threat Modeling

2

Threat modeling
This is a practice of heightening network security through detecting intentions and
weaknesses and then describing mitigation factors to avert or alleviate the regulations that are
likely to be posed by threats in the system. The aim of this practice is to deliver systematic
analysis to the defenders with details of a likely attacker, the most likely attack vectors, and the
assets most desired by an attacker.
Threat modeling drill can be created in a culture where it had never been practiced.A
culture is influenced to carry out a self-evaluationby answering some basic
questions(Shostack,2014). These are such as, what is being worked on, what might go wrong, if
it goes wrong, what can be done about it and finally, was the job commendable at the end.
The best way to answer the question of what is been worked on is by assembling the
system architects, testers, and the security personnel. It is important to include customer advocate
too. This gives them a chance to talk about their tasks and share their different understanding of
the system. At the end of the interaction, they will have been able to come up with a drawing on
a whiteboard on how the system works.
After coming up with a chart on how the system works, then one can isolate where
attacks are likely to occur. In order to navigate the system and determine breaches, these few
factors can be put in place spoofing, interfering, refutation, information leak, repudiation of
service, advancement of privilege. These factors are associated with the system, for example, can
someone tamper with the database? At the one, one is able to come up with lik...

flag Report DMCA
Review

Anonymous
The best tutor out there!!!!

Similar Questions
Hot Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors