From the course: Learning Threat Modeling for Security Professionals

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

What are we going to do about it?

What are we going to do about it?

From the course: Learning Threat Modeling for Security Professionals

Start my 1-month free trial

What are we going to do about it?

- Now, we found a few threats. Our client, AgePlus, could upload content to another client's account, let's say Topsy Turvy. The media servers might be so overwhelmed, that they can't send packets to the billing servers. That brings me to the third key question that frames threat modeling. What are we going to do about each of these awful problems? The very first thing to do is to track them. I can start with notes on a white board, and later transfer them to our bug tracking system. Now, maybe it doesn't seem like these are bugs. Well, maybe they are, maybe they aren't. Right now, what can go wrong is that we find lots of problems and lose track of them. That'd be annoying. Anyway, I'd better get these threats up here before I lose track. Spoofing, login to someone else's account, and upload content to be shown on their bill, denial of service, media server is overwhelmed, media service network interface get filled, ad server can't be contacted. Now, these words aren't exactly what I…

Contents