{"id":163,"date":"2014-02-11T19:31:31","date_gmt":"2014-02-11T19:31:31","guid":{"rendered":"http:\/\/cybersecurity.bellevue.edu\/?p=163"},"modified":"2014-02-11T19:31:31","modified_gmt":"2014-02-11T19:31:31","slug":"threat-modeling-whats-the-worst-that-can-happen","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2014\/02\/11\/threat-modeling-whats-the-worst-that-can-happen\/","title":{"rendered":"Threat Modeling \u2013 What&#8217;s the worst that can happen?"},"content":{"rendered":"<p>A threat is defined as \u201ca person or thing likely to cause damage or danger.\u201d \u00a0Threats are all around us, but we shouldn\u2019t treat all threats as equal.\u00a0 Too often we fail to identify threats because they aren\u2019t readily apparent or we consider them to be too small.<\/p>\n<p>Threats and vulnerabilities are both part of the overall risk equation.\u00a0 While organizations are getting better at identifying and fixing weaknesses, many still don&#8217;t understand the potential threat landscape.\u00a0 We&#8217;ve all heard, &#8220;Oh no one would ever want to attack us. We&#8217;re so small and our systems have no value.&#8221;\u00a0 I can hear Target saying that about their HVAC systems. Malicious hackers can use anything connected to a production network in order to gain access. \u00a0It shouldn\u2019t be assumed that a small target means it can\u2019t be hit.<\/p>\n<p>All organizations should conduct assessments to understand the multitude of threats they face both in and out of their cybersystems. Threat modeling is still a new arena in security, but it&#8217;s gaining in prevalence.\u00a0 In CSOOnline (<a href=\"http:\/\/www.csoonline.com\/\" rel=\"nofollow\">http:\/\/www.csoonline.com\/<\/a>), George V. Hulme has an article, &#8220;<a href=\"http:\/\/www.csoonline.com\/article\/747792\/can-threat-modeling-keep-security-a-step-ahead-of-the-risks-\" target=\"_blank\">Can threat modeling keep security a step ahead of the risks<\/a>?&#8221; where he makes a case for more effective threat modeling.\u00a0He references how a CISO uses threat modeling to understand the organization\u2019s risks, prioritize security spending, and focus security efforts.<\/p>\n<p>Adam Shostack is also calling for increased threat awareness.\u00a0 In his book coming out on Feb 17 called, &#8220;<a href=\"http:\/\/www.amazon.com\/Threat-Modeling-Designing-Adam-Shostack\/dp\/1118809998\/\" target=\"_blank\">Threat Modeling: Designing for Security<\/a>&#8221;\u00a0 he explores various threat modeling approaches, explains how to test system designs against threats, and learn effective ways to address threats that have been validated at many top companies.<\/p>\n<p>What does this mean for you?\u00a0 As security professionals, we conduct threat modeling throughout our career.\u00a0 That&#8217;s why we take the time to study threat modeling and apply it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A threat is defined as \u201ca person or thing likely to cause damage or danger.\u201d \u00a0Threats are all around us, but we shouldn\u2019t treat all threats as equal.\u00a0 Too often we fail to identify threats because they aren\u2019t readily apparent or we consider them to be too small. Threats and vulnerabilities are both part of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[32,7,35],"tags":[],"class_list":["post-163","post","type-post","status-publish","format-standard","hentry","category-concepts","category-assessments","category-threat-modeling"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=163"}],"version-history":[{"count":1,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/163\/revisions"}],"predecessor-version":[{"id":164,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/163\/revisions\/164"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}