Introduction to Threat Modelling in cyber security
minhajulislammoon
0 views
42 slides
Sep 01, 2025
Slide 1 of 42
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
About This Presentation
Introduction to Threat Modelling in cyber security
Size: 23.81 MB
Language: en
Added: Sep 01, 2025
Slides: 42 pages
Slide Content
9
C3 SECURITY
C3 SECURITY
WHAT IS A
THREAT MODEL?
CYBER SECURITY HYGIENE
WHAT IS A THREAT MODEL? S
C3 SECURITY
OBJECTIVES OF A THREAT MODEL
IDENTIFY
» potential vulnerabilities and/or threats
DESCRIBE
» counter-measures to mitigate risk
PRIORITISE
» resources to maximise system security
O C3 SECURITY LTD 2020 https;
WHAT IS A THREAT MODEL? S
C3 SECURITY
OBJECTIVES OF A THREAT MODEL
DOCUMENTING RISK
WHAT IS A THREAT MODEL? S
C3 SECURITY
THE VALUE PROPOSITION: RISK MITIGATION
REPUTATION
» loss of customer confidence and trust; a weakened brand
OPERATIONS
» disruption of business operations
FINANCIAL
» loss of earnings, fines & restitution
GOVERNANCE & COMPLIANCE
> GDPR, Data Protection Act 2008, ISO27001 et. al.
O C3 SECURITY LTD 2020 https;
C3 SECURITY
JUST LIKE THE FUNCTIONAL, DESIGN AND TEST
SPECS, A THREAT MODEL IS A LIVING DOCUMENT —
AS YOU CHANGE THE DESIGN,
TO SEE IF ANY
NEW THREATS HAVE ARISEN SINCE YOU STARTED.
C3 SECURITY
THREAT
MODELLING
DOCUMENTING RISK
O C3 SECURITY LTD 2020
CREATING A THREAT MODEL S
C3 SECURITY
FUNDAMENTAL QUESTIONS: ASK YOURSELF
» What are we working on?
» What can go wrong?
» What are we going to do about it?
» Did we do a good job?
Adapted from “Application Threat Modelling” by OWASP
hutps:/owasp.ore/www-community/Application Threat "3