threat_modelling
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
threat_modelling [2021/02/26 08:48] – neil | threat_modelling [2021/10/15 10:25] (current) – neil | ||
---|---|---|---|
Line 6: | Line 6: | ||
You’ll sometimes see this described as “threat modelling” or understanding your "risk scenario" | You’ll sometimes see this described as “threat modelling” or understanding your "risk scenario" | ||
- | If you are still no wiser about where you should start, try the UK National Cyber Security Centre' | + | If you are still no wiser about where you should start, try the UK National Cyber Security Centre' |
====Key points ==== | ====Key points ==== | ||
- | * [[threat_modelling# | + | * [[threat_modelling# |
* [[threat_modelling# | * [[threat_modelling# | ||
* [[threat_modelling# | * [[threat_modelling# | ||
Line 17: | Line 17: | ||
* [[threat_modelling# | * [[threat_modelling# | ||
- | ====What are trying to protect? | + | ====What are you trying to protect? |
The reason you do this is that, without knowing the threats against which you’re trying to protect, you don’t know what mitigations you need to have in place. And, since you probably can’t do everything at once, you’ll need to understand the greatest threats you face, and so which are deserving of the greatest attention, and what measures are “nice to haves”, which could be done at some point in the future. | The reason you do this is that, without knowing the threats against which you’re trying to protect, you don’t know what mitigations you need to have in place. And, since you probably can’t do everything at once, you’ll need to understand the greatest threats you face, and so which are deserving of the greatest attention, and what measures are “nice to haves”, which could be done at some point in the future. | ||
threat_modelling.1614329303.txt.gz · Last modified: 2021/07/06 09:26 (external edit)