From the course: CompTIA SecurityX (CAS-005) Cert Prep

Unlock this course with a free trial

Join today to access over 24,300 courses taught by industry experts.

Threat modeling methods

Threat modeling methods

- Let's start out this lesson on the whiteboard, talking about abuse cases. So an abuse case method is really a threat modeling technique. So this could be called, I'm just going to put threat model. It can be called an abuse case or a misuse case. And the goal here is to identify and analyze potential security threats. So you're really going through a series of different realistic use cases that are applicable and probable for your environment, scenarios where a threat actor might exploit vulnerabilities in your systems, in your services, in your applications for malicious goals. So we consider use cases or abuse cases, and then we're also going to build visuals. So we're going to use different types of trees and other types of techniques to kind of build on this threat modeling. We may even get into gamification. That's a really good way to enhance your threat modeling with your security operations center or your SOC team. And that's like making a game out of it. Using player cards…

Contents