Difference between revisions of "Threat Model"
From MgmtWiki
(→Context) |
|||
Line 4: | Line 4: | ||
==Context== | ==Context== | ||
+ | Carnegie Mellon University Software Engineering Institute published a report on "Threat Modeling: 12 Available Methods" <ref>Nataliya Shevchenko, ''Threat Modeling: 12 Available Methods'' (2018-12-03) https://insights.sei.cmu.edu/sei_blog/2018/12/threat-modeling-12-available-methods.html</ref> | ||
+ | |||
Crispin Cowan on threat modeling <ref>https://www.leviathansecurity.com/blog/the-calculus-of-threat-modeling</ref> | Crispin Cowan on threat modeling <ref>https://www.leviathansecurity.com/blog/the-calculus-of-threat-modeling</ref> | ||
Revision as of 11:03, 30 March 2019
Full Title or Meme
A model of an information processing system that shows data flows around the system and which spots in the network that a susceptible to attack.
Context
Carnegie Mellon University Software Engineering Institute published a report on "Threat Modeling: 12 Available Methods" [1]
Crispin Cowan on threat modeling [2]
Problems
Solutions
References
- ↑ Nataliya Shevchenko, Threat Modeling: 12 Available Methods (2018-12-03) https://insights.sei.cmu.edu/sei_blog/2018/12/threat-modeling-12-available-methods.html
- ↑ https://www.leviathansecurity.com/blog/the-calculus-of-threat-modeling