Threat analysis

A threat analysis is a process used to determine which components of the system need to be protected and the types of security risks (threats) they should be protected from.

  1. identify assets which needs protection
  2. imagine possible violation scenarios and describe the impact
  3. collect threats, identify exposure and exploitability
  4. calculate threat risk levels by combining likelihood and impact
  5. plan mitigtaion for threats with high risk

System modeling

Identify system boundaries, describe intended operational environment.

Illustrate with a context block diagram.

Impact modeling

The goal is to collect system assets, and fill in the impact matrix: describe the impact of a security property violation.

Basic tenets (CIA) or protection goals are:

IMPACT CATEGORIES

IMPACT SCALE

PROTECTION GOALS

PROTECTED ASSETS AND SERVICES

Component description

List hardware and software components and describe potential violation scenarios for each protection goal and assign an impact rating.

Threat and risk list

Describe attack scenarios:

Updated 02 January 2023