# Difference between revisions of "Threat Model"

From MgmtWiki

(Created page with " https://www.leviathansecurity.com/blog/the-calculus-of-threat-modeling") |
|||

Line 1: | Line 1: | ||

+ | ==Full Title or Meme== | ||

+ | A model of an information processing system that shows data flows around the system and which spots in the network that a susceptible to attack. | ||

− | https://www.leviathansecurity.com/blog/the-calculus-of-threat-modeling | + | ==Context== |

+ | Crispin Cowan on threat modeling <ref>https://www.leviathansecurity.com/blog/the-calculus-of-threat-modeling</ref> | ||

+ | |||

+ | ==Problems== | ||

+ | |||

+ | ==Solutions== | ||

+ | |||

+ | ==References== | ||

+ | |||

+ | |||

+ | [[Category:Glossary]] |

## Revision as of 12:08, 5 July 2018

## Full Title or Meme

A model of an information processing system that shows data flows around the system and which spots in the network that a susceptible to attack.

## Context

Crispin Cowan on threat modeling ^{[1]}