Chapter 15–Threat Models

In this chapter, we discuss Threat Models in detail, what they are and how we use them to provide secure designs. We will consider the design principles and stages of threat modeling and how we apply these techniques to the conceptual framework of the design to ensure that security is by design. Later we will show how to use the six-step approach to threat modeling and learn about more advanced IoT specific threat models and how to apply them to design frameworks.

In this chapter the reader will learn:

  1. What are threat models
  2. How to we apply threat models
  3. The 6 steps to building threat models
  4. Advanced threat models
  5. IoT vulnerabilities & threats

Once the architects have proposed a conceptual framework for the design ...

Get IoT Security Issues now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.