top of page

Example of Threat Identification Mapping - A Study Case of Binusmaya

  • Writer: Merry Marshela
    Merry Marshela
  • Oct 8, 2018
  • 1 min read

Brief Process:

Situation : All Binusian, from stuents to all levels of employee are using Binusmaya to check and organize schedules, courses, assignment, and so on. The term of usage is simply login using username and password like other platforms. Binusmaya can be logged on computers, smartphones, and any other resources that browsers are available. It now also can be connected to Binusmaya Mobile for smartphones.

Assets : Accounts contains personal, sensitive informations of all Binusian such address, phone number, email, family details, and more.


To create the threat identification mapping/ table, we need to define the assets related to applied technology. The more specific information of assests, the easier for us to assess the risk might occur to the assets. Make this table after brainstorming session. Make sure the team discuss the risk prcisely in the brainstorming session so it'll be helpful to define the risks.

Comments


©2018 by Learn IT Audit with Me. Proudly created with Wix.com

bottom of page