Threat Modeling

You've got a lot of enemies. At least, that's your perception. You like to draw your shades, get out your corkboard and string, and figure out the plots against you. How will they come at you? What's their master plan?

Delusional as you might be, you are involved in threat modeling. The process involves identifying how you might be attacked, and figuring out counter-maneuvers. Typically, threat modeling involves considering your vulnerabilities from an outsider's view. "If I were them, how would I get me?"

Threat modeling might be used in areas like cybersecurity, attempting to find the best way to prevent hackers from gaining access to a system. It could be used in traditional security as well, like a bank creating protections from potential robbers. Or the process can be adapted to general corporate planning. In this model, company executives would think about competitors as attackers, and consider the firm's market limitations in the same light as security vulnerabilities. Threat model the market.



Find other enlightening terms in Shmoop Finance Genius Bar(f)