top of page

Threat analysis

The foundation of proactive security is threat analysis. The threat analysis answers the three essential questions in the field of security:

What needs to be protected?

Who has an interest in the protected resources?

How does the opponent work to achieve his goal?

Orca Secure used for threat analysis development

the BowTie methodology. Based on clear diagrams,

inventoried hazards, critical events, threats and consequences are presented.

In addition, the diagram shows the proposed security measures to mitigate the threats.

Based on the so-called Perpetrator Matrice, an inventory is made of which types of opponents can threaten the protected environment. Based on the criminal planning cycle, Operational Methods are defined for the identified threats. These practices are listed in Threat Matrices by potential damage and difficulty.

The completed Threat Matrix shows the degree of vulnerability of the organization.

OrcaSecure helps organizations with the development of threat analysis. Please contact us for additional information or questions.

.

bottom of page