5. 2. 2019

Threat assessment

Threat assessment

We will verify whether the threat you received or detected is credible or not. Just because there is a threat, doesn’t automatically mean that you have to get rid of it or invest into minimalizing it.

Relevant application​

When a new threat is discovered or someone declares that an attack will be carried out in the future.

Our procedure​

Our goal is to answer the question: What could go wrong? We will assess the credibility and impact of the potential threat along with the probability that the threat could realistically happen. We assess threats via the STRIDE, DREAD or attack tree methods and according to which method works best in the given situation.

Result

A report including an analysis and the method employed, which will clarify how we came to the conclusion that we did.