From the course: Ethical Hacking: Vulnerability Analysis

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Modeling threats

Modeling threats

- [Instructor] One way to prevent an attack is to be able to see where the attack might occur. In this segment, we'll outline how threat modeling helps visualize vulnerabilities within entry points, such as software, networks, and users, so they can be mitigated before resulting in an attack. Today, there are multiple security threats that include malware, supply chain attacks, ransomware, and cryptojacking. When evaluating threats, the security analyst performs several exercises. Let's talk about a few methods. A vulnerability analysis is analyzing potential weaknesses across multiple attack vectors. A threat assessment will determine the best approach to secure a system against a particular threat. And threat modeling looks at external attack vectors to understand how the attacks could be executed. Threat modeling methods are used to create a visualization of the entire system, along with potential entry points and the list of possible attacks. The idea is to gain a well-rounded…

Contents