ABSTRACT

Twentieth century is undergoing a huge change on businesses, end-users buying commodities, and even how billion-dollar deals are finalized. Digitization has seen global trends fit within the reaches of four walls of an end-user. With a major pandemic situation overseen in 2020, the need for working remotely, realizing daily KPIs online, and creating a barrier on how systems are designed has become more important than ever. Increased needs in cloud computing, introductions of General Data Protection Regulations (GDPR), usage of remote devices, etc., has influenced the needs of highly secured systems which follow a strict jurisdiction on possible threats and how to mitigate them.

Threat analysis is the process of evaluating suspicious actions, breach by intelligence bodies or cybercriminals. Security threats are damaging and follow well-defined strategic moves, which leads to a breach. The prevention of attack scenarios is a study of attack strategies and the necessary steps that are taken to avoid any such breaches.

This chapter looks at security threats and strategies used by cybercriminals to gain access to a system and cause damage. We will learn about threat modeling techniques and prevention measures, that are employed by organizations to ensure that data is safe and secured.