Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson covers threat modeling. When threat modeling, it is important to identify security objectives, taking into account the following things: • Legislative drivers • Contractual requirements • Alignment with business objectives Threat modelling also involves the C-I-A Triad (Confidentiality-Integrity-Availability). Participants also get to learn about threat modeling tool such as data flow diagrams and use/misuse cases.