Difference between revisions of "Threat Model"
From MgmtWiki
(Created page with " https://www.leviathansecurity.com/blog/the-calculus-of-threat-modeling") |
|||
Line 1: | Line 1: | ||
+ | ==Full Title or Meme== | ||
+ | A model of an information processing system that shows data flows around the system and which spots in the network that a susceptible to attack. | ||
− | https://www.leviathansecurity.com/blog/the-calculus-of-threat-modeling | + | ==Context== |
+ | Crispin Cowan on threat modeling <ref>https://www.leviathansecurity.com/blog/the-calculus-of-threat-modeling</ref> | ||
+ | |||
+ | ==Problems== | ||
+ | |||
+ | ==Solutions== | ||
+ | |||
+ | ==References== | ||
+ | |||
+ | |||
+ | [[Category:Glossary]] |
Revision as of 12:08, 5 July 2018
Full Title or Meme
A model of an information processing system that shows data flows around the system and which spots in the network that a susceptible to attack.
Context
Crispin Cowan on threat modeling [1]