{"id":227106,"date":"2023-03-09T06:54:06","date_gmt":"2023-03-09T06:54:06","guid":{"rendered":"https:\/\/www.devsecops.ltd\/?p=227106"},"modified":"2024-01-31T08:15:06","modified_gmt":"2024-01-31T08:15:06","slug":"dread-threat-modeling","status":"publish","type":"post","link":"https:\/\/www.devsecops.ltd\/dread-threat-modeling\/","title":{"rendered":"DREAD Threat Modeling Methodology"},"content":{"rendered":"

In our hyper-connected world, security breaches, and incidents are a certainty. According to a report from Statista, the cost of cybercrime committed globally is expected to rise from <\/span>$8.44 trillion in 2022 to $23.84 trillion by 2027.<\/span>\u00a0<\/span><\/p>\n

Statista’s report expects the cost of cybercrime committed globally to rise from $8.4 trillion in 2022 to $23.84 trillion by 2027. In fact, <\/span>Cyber attackers do 86% of cyberattacks for financial gain, and “state espionage” is a close second.<\/p>\n

Although there are several strategies to address and prevent cyber attacks, one approach that can be used to gauge and reduce cyber attacks is threat modeling, among several other strategies. The foundation when “shifting left” in a DevSecOps environment is the threat modeling approach, as it helps to find vulnerabilities and threats much earlier in the software development lifecycle. This, in turn, saves the organization’s reputation and reduces monetary and timely losses. While there are several threat modeling approaches, such as STRIDE<\/a>, PASTA, VAST, STRIKE, and more, we will be discussing the DREAD threat modeling approach in this post.<\/p>\n

\n
\n

Table of Contents<\/p>\nToggle<\/span><\/path><\/svg><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n