Difference between revisions of "Threat Model"

From MgmtWiki
Jump to: navigation, search
(Context)
Line 4: Line 4:
  
 
==Context==
 
==Context==
 +
Carnegie Mellon University Software Engineering Institute published a report on "Threat Modeling: 12 Available Methods" <ref>Nataliya Shevchenko, ''Threat Modeling: 12 Available Methods'' (2018-12-03) https://insights.sei.cmu.edu/sei_blog/2018/12/threat-modeling-12-available-methods.html</ref>
 +
 
Crispin Cowan on threat modeling <ref>https://www.leviathansecurity.com/blog/the-calculus-of-threat-modeling</ref>
 
Crispin Cowan on threat modeling <ref>https://www.leviathansecurity.com/blog/the-calculus-of-threat-modeling</ref>
  

Revision as of 11:03, 30 March 2019

Full Title or Meme

A model of an information processing system that shows data flows around the system and which spots in the network that a susceptible to attack.

Context

Carnegie Mellon University Software Engineering Institute published a report on "Threat Modeling: 12 Available Methods" [1]

Crispin Cowan on threat modeling [2]

Problems

Solutions

References

  1. Nataliya Shevchenko, Threat Modeling: 12 Available Methods (2018-12-03) https://insights.sei.cmu.edu/sei_blog/2018/12/threat-modeling-12-available-methods.html
  2. https://www.leviathansecurity.com/blog/the-calculus-of-threat-modeling