logo

Cybersecurity Threat Model Report

   

Added on  2023-06-18

10 Pages1987 Words460 Views
 | 
 | 
 | 
Cybersecurity Threat
Model Report
Cybersecurity Threat Model Report_1

Table of Contents
INTRODUCTION...........................................................................................................................1
Purpose of report.........................................................................................................................1
Area of research..........................................................................................................................1
Context of research.....................................................................................................................1
Concepts of cybersecurity...........................................................................................................2
Purpose of drawing the threat
model..........................................................................................................................................2
MAIN BODY...................................................................................................................................3
Requirements of the case study...................................................................................................3
Data flow diagram.......................................................................................................................3
Identifying threats to the system.................................................................................................5
Understanding the threats............................................................................................................5
CONCLUSION................................................................................................................................6
Findings.......................................................................................................................................6
Recommendations.......................................................................................................................6
Covered in the report...................................................................................................................7
References:.......................................................................................................................................8
Cybersecurity Threat Model Report_2

INTRODUCTION
Purpose of report
The following discussion is made on the given case study of The Business &
Communication Insurance company in terms of cyber thefts and cyber security. This is a type of
research report which is studied as per the given scenario and generated accordingly. Discussion
is based on the area of research and context of research along with the concepts of cyber security
and purpose of drawing the threat model. Moreover, a proper review is conducted on the case
study given and therefore, requirements of the case study is mentioned and data flow diagram as
well along with the identification of threats to the system and understanding the threats with an
appropriate discussion is also done. Discussion is also made on the conclusion part which
includes the findings and recommendations along with the things covered in the report.
Area of research
Area of research is based on the cyber security threat model which is defined as the
procedure in order to identify and enumerate along with the mitigation process of potential
threats like structural vulnerabilities and absence of proper safeguards or protections on a prior
basis. In other words, threat model is a methodology of preparing security of network with the
help of locating the vulnerabilities and identification of the goals and objectives along with the
development of the counter measures in order to prevent and mitigate the negative impacts of the
cyber attacks which can harm the systems. It has a process which mainly includes five
components such as threat intelligence and asset identification along with the mitigating
capabilities and risk assessment which is followed by the threat mapping. All such elements of
threat modelling renders the assorted and various types of visibility and insights into the
perimeter of the security implemented.
Context of research
Context of research is base on the entire process of the cyber security threat model as per
the given case study such as this process includes mainly four steps which is applied in resolving
out the issues given as per the scenario given. First step states the diagram which describes the
what exactly is required to get build with help of diagram specifying all the requirements.
Second step states the identification of threats which describes the the estimation or the current
situation which can go wrong or currently it is going wrong. Third step states the mitigation
1
Cybersecurity Threat Model Report_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Operation Management Risk
|8
|1789
|64

Importance of Cybersecurity Risk PDF
|23
|7983
|24

Business Research Assignment | Cyber Security and Virtual Networks
|9
|1893
|37

CYBERSECURITY CASE STUDY EVALUATION.
|3
|348
|28

Faculty of Engineering Environment And Computing
|18
|3778
|41

Misconceptions about Cybersecurity and How to Invest in it
|14
|2327
|79