threat_modelling
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
threat_modelling [2021/02/26 08:49] – neil | threat_modelling [2021/10/15 10:25] (current) – neil | ||
---|---|---|---|
Line 9: | Line 9: | ||
====Key points ==== | ====Key points ==== | ||
- | * [[threat_modelling# | + | * [[threat_modelling# |
* [[threat_modelling# | * [[threat_modelling# | ||
* [[threat_modelling# | * [[threat_modelling# | ||
Line 17: | Line 17: | ||
* [[threat_modelling# | * [[threat_modelling# | ||
- | ====What are trying to protect? | + | ====What are you trying to protect? |
The reason you do this is that, without knowing the threats against which you’re trying to protect, you don’t know what mitigations you need to have in place. And, since you probably can’t do everything at once, you’ll need to understand the greatest threats you face, and so which are deserving of the greatest attention, and what measures are “nice to haves”, which could be done at some point in the future. | The reason you do this is that, without knowing the threats against which you’re trying to protect, you don’t know what mitigations you need to have in place. And, since you probably can’t do everything at once, you’ll need to understand the greatest threats you face, and so which are deserving of the greatest attention, and what measures are “nice to haves”, which could be done at some point in the future. | ||
threat_modelling.1614329391.txt.gz · Last modified: 2021/07/06 09:26 (external edit)