Get Instant Help From 5000+ Experts For

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
CYB 250 Cyber Defense


Threat modeling is an important process to help identify deficiencies in systems that are meant to keep assets secure. Using a framework like the Howard Threat Model while summarizing the attack provides an industry vetted model that allows for easy identification of incidents versus threats. Every cyber incident can be depicted in threat modeling scenarios, which provides an industry standard to communicate the characteristics of any threat. Threat modeling is an important practice for cybersecurity analysts because they must compare different forms of threats to identify common characteristics and build the most secure defense against threats. This activity will draw on important fundamentals we have explored previously, like the confidentiality, integrity, and availability (CIA) triad and adversarial mindset. 
This activity relates directly to the final project, where you will be required to complete a threat model for your project scenario. Take advantage of feedback on this assignment to prepare you for your final project submission in Module Seven. 


Analyze the three breach case studies found in the three articles that are linked in the Reading and Resources section of Module Three of your course. 
Incident Analysis  

Select one of the incidents from the table and analyze the following: 

A. Which of the CIA triad is most  applicable to the “Action”  category of  the selected  incident? Explain  your answer. 
B. How can you use an adversarial mindset in  analyzing the “Attackers” and  “Objective”  to  inform  the response  to  the attack? 
C. Imagine you worked for the organization in the chosen incident and had used a threat model proactively. What changes could you have made to the organization to avoid the incident? 

III.  Threat Modeling Extension  
A. Defend the need for performing threat modeling. How would you convince your supervisor that threat modeling is worth the time and resources needed to complete it? 
i. Why is threat modeling an important tool for a security practitioner? 
ii. What organizational advantages beyond security controls might arise from this threat modeling exercise? 

B. How does threat modeling differ between roles in IT (for example, testers—data mutations; designers—analyzing threats; developers—tracking data flow)? 

sales chat
sales chat