Week 3 Discussion - Threat Modeling
Question # 00849808
Posted By:
Updated on: 01/17/2024 04:23 AM Due on: 01/17/2024
Week 3 Discussion - Threat Modeling
Threat modeling is the process used to identify security requirements by reviewing a diagram of the information technology architecture. The threat surface is the sum total of all the ways a threat can cross the boundary.
In this discussion post, you will use threat modeling to secure your residence.
Please respond to the following in a post of words:
Address each of these threat modeling steps to secure your residential system:
- Step 1: Identify security objectives.
- Step 2: Identify assets and external dependencies.
- Step 3: Identify trust zones.
- Step 4: Identify potential threats and vulnerabilities.
- Step 5: Document your threat model.
Note:
- In your post, be sure to explain how physical, logical, and administrative aspects of threats may interact.
- Remember to cite any sources you use, including your textbook, using the Strayer Writing Standards format.
-
Rating:
5/
Solution: Week 3 Discussion - Threat Modeling