From the course: SecOps on Google Distributed Cloud (GDC) for Tier 3 Analysts by Google

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Introduction to modeling techniques

Introduction to modeling techniques

- [Narrator] Threat modeling is an indispensable technique for enhancing the security of your organization. This is particularly true for complex frameworks, such as GDC. So, what techniques can you use to model a threat? A variety of methods have been crafted to assist you in pinpointing, evaluating, and neutralizing potential security threats before they become exploitable adversaries. The most common include STRIDE, PASTA, VAST, Trike, CVSS, Attack Trees, Security Cards, and the Hybrid Threat Modeling Method, htMM Each method is uniquely purposed and specifically tailored to address various facets of security assessment and strategic planning. While it's recommended you look at all these model techniques in more detail, the following videos will introduce the top three in more detail: STIDE, PASTA, and CVSS.

Contents