Question

WEEK 3 DISCUSSION# 2 ANSWER THE FOLLOWING 1: Why is threat modeling an important component of...

WEEK 3 DISCUSSION# 2

ANSWER THE FOLLOWING

1: Why is threat modeling an important component of risk management?

2: Fully explain how to use one of the threat modeling tools

0 0
Add a comment Improve this question Transcribed image text
Answer #1

`Hey,

Note: If you have any queries related the answer please do comment. I would be very happy to resolve all your queries.

1)

Whether threat modeling is performed on an existing application or throughout the software development lifecycle it is an essential component in the risk management arsenal because it can help quantify and visualize the otherwise intangible threats an application carries. Threat modeling is not a trivial exercise and should be done with effort and precision so as not to miss any aspect of the attack surface applications expose.

Threat modeling is a powerful technique that helps to characterize the higher level threat and separate it into more manageable sub-threats that can be addressed.
From a business perspective, IT security exists only in the context of risk management. Large corporations are driven by risk management concerns including the risk of non-compliance, the risk of data loss, and the risk of financial loss through IT theft, legal sanctions, and infrastructure downtime.
Although vulnerabilities, hackers and exploits are compelling reasons to focus on application security, they have been overshadowed by compliance and risk issues in the minds of corporate decision makers. The myriad of regulations and standards are imposing stricter IT security requirements and application security has reached a pinnacle of importance in the context of regulatory compliance.
Risk management is a key requirement of many of these regulations and is one of the most difficult processes to conduct and complete. The difficulty lies in the fact that although the high-level threat is generally well understood (breach of customer data, denial of service etc.), the underlying causes and sub-threats that can lead to it remain obscure

Note: Brother According to Chegg's policy we are only allowed to answer first part if there are many. So, I request you to post other part as separate posts.

Kindly revert for any queries

Thanks.

Add a comment
Know the answer?
Add Answer to:
WEEK 3 DISCUSSION# 2 ANSWER THE FOLLOWING 1: Why is threat modeling an important component of...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT