Threat modeling

In Chapter 2, Vulnerabilities, Attacks, and Countermeasures, we walked through a threat modeling process for a smart parking system. Here, we talk more about the threat modeling process and discuss a tool that can be used to model the threats to your unique systems.

The best defense against attacks aimed at your products and systems is to design security in from the beginning. But not all systems are alike, and nor do they each face the same threats. Design teams must arm themselves with the information needed to understand the unique threats faced by their systems. This requires starting out with a threat model of your system.

The outputs of your threat model will allow you to derive security requirements/user stories that ...

Get Practical Internet of Things Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.