Summary
Threat modeling is a vital topic in terms of building intelligence. Understanding the attack surfaces, the threat vectors, and the adversaries (and their motives) facilitates a good security stance. This chapter has covered threat modeling by focusing on the different methods that a CTI team can adopt to build a reliable threat profile. The common denominator for all threat modeling approaches includes knowing the assets, the vectors, and the surfaces as they are points of interest to attackers. The result of threat modeling is used to select data sources that should be used for the intelligence program.
At this point, you should be able to perform threat and adversary modeling. You should also be able to select the appropriate method for a modeling task or customize the approach based on your organization's requirements.
In the next chapter, we will look at threat intelligence data sources.