What is the threat model?
The
threat model is a hypothetical safety threat to the system, identified and quantified to facilitate the fight to prevent a security problem using proactive security measures. Modeling of threats is used to develop operating systems, software and various computer tools. Companies can take their models through a series of phases to identify threats, neutralize them and find out what is in their wake.
There are several different perspectives that developers can use to model threats. One involves considering the assets stored in the system to determine what kinds of people they could have access to them, how devoted they would be and how serious the threat could be if the information was violated. In this model of asset threats, the main problem is what is stored in the system, and safety systems are structured around this. This model evaluates a system for gaps that could become a problem if a hackThe era were interested. It is also possible to consider threats from the attacker's point of view by profiling of the hypothetical attacker and thinking about how this person could try to access the system and what this person could do there. This type of threat model could explore the extent from vandalism to the removal of intimate information.
In the threat model, the developer wants to identify the threat, to assess how serious it is, and develop repair to avoid the problem. This requires constant adaptation, as new threats are constantly appearing. In the process of repairing older threats, developers can identify new problems or could cause problems through their work. For this reason, they tend to maintain careful protocols of their activities and work to actively identify the development of threats.
threat models can use information technology staff responsible for the company network, antivirus developers and for forGramators who create new operating systems and programs. Their work may include participation in security conferences and hiring external consultants to get a new view of computer security problems. In some organizations working with open source code material, users can contribute to their own threats and proposed repairs. This approach to developing a model of threat to the crowd can help society to identify problems faster and use people who can think and use computers in radically different ways, and thus identify problems that others may not catch.