TY - CONF
T1 - An Introduction to Threat Modelling: Modelling Steps, Model Types, Benefits and Challenges
AU - Naik, Nitin
AU - Jenkins, Paul
AU - Grace, Paul
AU - Naik, Dishita
AU - Prajapat, Shaligram
AU - Song, Jingping
PY - 2024/10/28
Y1 - 2024/10/28
N2 - The proliferation of cybersecurity threats is posing substantial security risks to organisations; therefore, it requires robust countermeasures and defence mechanisms for organisational IT systems, applications and data. Threat modelling is a process of identifying, analysing, prioritising and mitigating cybersecurity threats and their associated vulnerabilities in a system or network. Understanding the threat modelling process, as well as its benefits and limitations, whilst selecting an appropriate threat modelling method that may assist cybersecurity experts in their comprehensive security assessments. The assessments are designed to uncover security gaps and potential threats, to develop robust countermeasures against these potential threats and strengthening the security of organisational IT systems, applications and data. This paper will present a comprehensive study concerning threat modelling including the phases involved in threat modelling, types of threat models, benefits and challenges of threat modelling. Therefore, this comprehensive study concerning threat modelling will simplify the essential terminologies of threat modelling to users in a clear and concise manner.
AB - The proliferation of cybersecurity threats is posing substantial security risks to organisations; therefore, it requires robust countermeasures and defence mechanisms for organisational IT systems, applications and data. Threat modelling is a process of identifying, analysing, prioritising and mitigating cybersecurity threats and their associated vulnerabilities in a system or network. Understanding the threat modelling process, as well as its benefits and limitations, whilst selecting an appropriate threat modelling method that may assist cybersecurity experts in their comprehensive security assessments. The assessments are designed to uncover security gaps and potential threats, to develop robust countermeasures against these potential threats and strengthening the security of organisational IT systems, applications and data. This paper will present a comprehensive study concerning threat modelling including the phases involved in threat modelling, types of threat models, benefits and challenges of threat modelling. Therefore, this comprehensive study concerning threat modelling will simplify the essential terminologies of threat modelling to users in a clear and concise manner.
UR - https://www.techrxiv.org/users/845749/articles/1234180-an-introduction-to-threat-modelling-modelling-steps-model-types-benefits-and-challenges?commit=3644763bd0e5697013b75788b55e82f06100be8e
U2 - 10.36227/techrxiv.173014165.57428154/v1
DO - 10.36227/techrxiv.173014165.57428154/v1
M3 - Unpublished Conference Paper
ER -