Threat modeling should account for the importance or value of an asset and its prioritization. As discussed in previous modules, protecting assets should be commensurate with their value. For this activity, create a list of the top five threats you perceive important in the current technological environment. If you are using threats to your work, school, or home, please generalize specific references to avoid disclosing sensitive information.
Provide details to the list you created and create a hierarchical structure with tree, root, and leaf nodes as necessary. Access the following web pages for more information on hierarchical and threat–asset matrices:
Crio. “Diagram of Binary Tree Links to an external site..” Accessed May 2, 2022.
IEM. “Ranked Critical Resources Links to an external site..” Accessed May 2, 2022.
Finally, discuss the advantages and disadvantages of hierarchical vs. threat–asset matrices.