Uploaded on Oct 31, 2022
An experienced threat response consultant would rely on STRIDE cyber threat modeling methodology from the get-go. This threat model is the brainchild of engineers at Microsoft. One of the compelling upsides of this threat model is its ability to evaluate individual systems. Website: https://www.fncyber.com/threat-response-engineering
                     Threat Modelling Methodologies
                     Threat 
Modellin
g
Methodo
logies
● It allows CTOs to protect their enterprise in the digital realm. 
Benefits of Cyber Essential resources are redirected so that cyber security 
Threat Modeling at a experts can keep their enterprise protected.
● Cyber threat mitigation plans are prepared on priority in a 
Glance bid to ensure that cyber security solutions can be readily 
implemented.
● It allows CTOs to ensure that defense mechanisms are 
periodically updated, in line with ever-evolving cyber threats.
● Security vulnerabilities in proprietary software are patched 
on time before they can be exploited by cybercriminals.
An experienced threat response consultant would rely on STRIDE cyber threat modeling 
methodology from the get-go. This threat model is the brainchild of engineers at Microsoft. 
One of the compelling upsides of this threat model is its ability to evaluate individual systems.
STRIDE can be used to detect threats such as –
STRIDE 
-Threat ● Spoofing — users or programs that pretend to be something or someone they are not.
Modeling ● Tampering — a modified section of source code in a website or app that can be used as a backdoor to gain illegal access.
● Repudiation — instances when threat events go unnoticed.
● Information disclosure — in the form of leaked or exposed business-critical 
data.
● Denial of service (DoS) — where a website crashes and become unavailable 
for business use due to online traffic overload from spam sources.
● Elevation of privilege — where cybercriminals give themselves admin-level 
clearance to a system of an enterprise and carry out a full-blown cyber 
attack.
As per the spokesperson of a revered provider of 
cyber security consulting services, PASTA is yet another revered cyber threat 
modeling methodology.
PASTA is the abbreviation for Process for Attack Simulation and Threat Analysis. It 
is a cyber attacker-centric methodology that entails seven steps.
The steps are as follows -
PASTA Cyber The business objectives are first defined.
Threat ● The next step is defining the technical scope of components and assets.● The next step is the decomposition of the affected application and 
Modeling identifying its set of controls that have been compromised.● The following step is the analysis of threat(s) which is based on threat 
Methodology intelligence.● After that, the affected software or sections in the affected IT 
infrastructure will be scanned for vulnerabilities.
● Following that, detailed modeling of the attack will commence and then
● A risk analysis will commence followed by the development of 
countermeasures.
CVSS stands for Common Vulnerability Scoring System. It is a 
standardized cyber threat scoring system. It allows a cyber security 
expert to assign scores to known cyber threats.
This system entails a design that allows cyber security experts –
CVSS Threat 
● Run treat assessments
Modeling ● Apply and assess threat intelligence
● Identify the impact of a cyber-attack and
Methodology ● Identify the countermeasures that are being used by an 
enterprise against incoming threats in real-time.
Cyber resilience should be the norm in small, medium and large-
scale enterprises. Cyber threat has exacted a heavy toll on the online 
community, posing constant fear of the breach of sensitive data. So 
threat modelling is taking a step back, assessing your organization’s 
digital and network assets, identifying weak spots, determining 
what threats exist, and developing plans to protect or recover. The 
best results can only be achieved by hiring a third party that excels 
in offering cybersecurity solutions.
THANKYOU 
                                          
               
            
Comments