{"id":2495,"date":"2022-05-31T16:38:12","date_gmt":"2022-05-31T20:38:12","guid":{"rendered":"https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/?p=2495"},"modified":"2022-05-31T16:38:12","modified_gmt":"2022-05-31T20:38:12","slug":"what-is-threat-modeling","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/2022\/05\/31\/what-is-threat-modeling\/","title":{"rendered":"What is threat modeling?"},"content":{"rendered":"<p>Threat modeling is a process for optimizing application, business, or system processes by identifying potential threats and vulnerabilities, and establishing countermeasures to prevent or lessen the effects of those threats to the system.\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2501 alignright\" src=\"https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/files\/2022\/05\/Screen-Shot-2022-05-31-at-4.34.38-PM-300x207.png\" alt=\"\" width=\"300\" height=\"207\" srcset=\"https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/files\/2022\/05\/Screen-Shot-2022-05-31-at-4.34.38-PM-300x207.png 300w, https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/files\/2022\/05\/Screen-Shot-2022-05-31-at-4.34.38-PM-768x531.png 768w, https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/files\/2022\/05\/Screen-Shot-2022-05-31-at-4.34.38-PM.png 926w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p style=\"text-align: left\"><span style=\"color: #000080\"><strong>Five Major Threat Modeling Steps<\/strong><\/span>:<\/p>\n<ol>\n<li>Defining security requirements<\/li>\n<li>Creating an application diagram<\/li>\n<li>Identifying threats<\/li>\n<li>Mitigating threats<\/li>\n<li>Validating that the threats have been mitigated<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>Threat modeling works by identifying the various types of threat agents that could possibly cause harm to an application and\/or computer system, and adopts the perspective of hackers to see how much damage the threats can cause.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat modeling is a process for optimizing application, business, or system processes by identifying potential threats and vulnerabilities, and establishing countermeasures to prevent or lessen the effects of those threats to the system.\u00a0 Five Major Threat Modeling Steps: Defining security requirements Creating an application diagram Identifying threats Mitigating threats Validating that the threats have been [&hellip;]<\/p>\n","protected":false},"author":28307,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[663943],"tags":[],"class_list":{"0":"post-2495","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-instructor","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/wp-json\/wp\/v2\/posts\/2495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/wp-json\/wp\/v2\/users\/28307"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/wp-json\/wp\/v2\/comments?post=2495"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/wp-json\/wp\/v2\/posts\/2495\/revisions"}],"predecessor-version":[{"id":2504,"href":"https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/wp-json\/wp\/v2\/posts\/2495\/revisions\/2504"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/wp-json\/wp\/v2\/media?parent=2495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/wp-json\/wp\/v2\/categories?post=2495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec712summer2022\/wp-json\/wp\/v2\/tags?post=2495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}