Skip to content

THREATS​

Developing a Threat Profile - Understand who may be interested in your data

THREAT ACTOR
MOTIVATIONS
Nation States
Competitive intelligence
Organized Crime
Cyberespionage
Lone Hackers
Financial Gain
Hacktivists
Reputational Impact
Competitors
Competitors
Former Employees
Attacker reputation-building
Internal
External

Developing a Threat Profile

Los métodos de modelado de amenazas se utilizan para crear:

THREAT
PROPERTY VIOLATED
THREAT DEFINITION
Spoofing identify
Authentication
Pretending to be something or someone other than yourself.
Tampering with data
Integrity
Modifying something on disk, network, memory, or elsewhere
Repudiation
Nod-repudiation
Claiming that you didn’t do something or were not responsible, can be honest or false
Information disclosure
Confidentiality
Providing information to someone not authorized to access it
Denial of service
Availability
Exhausting resources needed to provide service
Elevation of privilege
Authorization
Allowing someone to do something they are not authorized to do

Identifying Assets and Threat Profile

How do we know if the client needs this service?
Security program assessment and strategy
Security requirements docs and analysis
Security development lifecycle assessment
Security policy and standards develompment and review
Security penetration testing

Security Tech Stack - Defense in depth and layered levels of security can be complex and costly

Security Technology Considerations

Security Technology Categories: examples

Cyber Security Strategy: Service Models

CYBER SECURITY STRATEGY STAGES

E1

Minimum security level

E2

Preventive Security

E3

Active Safety

E4

Proactive Security