As we move to system specificity, if we have predefined the relevant threats, we can apply the threats’ goals to the system under analysis. This application of goals leads directly on to the “AS” of ATASM: attack surfaces. Understanding your adversaries’ targets and objectives provides insight into possible attack surfaces and perhaps which attack surfaces are most important and should be prioritized.

It’s useful to understand a highly connected system like business analytics in situ, that is, as the system fits into its larger enterprise architectural context. However, we don’t yet have the architecture of the system itself. Figure 8.3 presents the logical components of this business analytics system.

Don't use plagiarized sources. Get Your Custom Essay on
Just from $13/Page
Order Essay

There are five major components of the system:

1. Data Analysis processing

2. Reporting module

3. Data gathering module

4. Agents which are co-located with target data repositories

5. A management console