Threat Modeling
From Guidance Share
(Difference between revisions)
Revision as of 07:42, 6 March 2007 (edit) Admin (Talk | contribs) ← Previous diff |
Current revision (05:07, 13 December 2007) (edit) JD (Talk | contribs) |
||
Line 1: | Line 1: | ||
+ | {| | ||
+ | |[[image:ThreatModelingCenter.gif]] | ||
+ | || | ||
Threat modeling is an engineering technique you can use to help you identify threats, attacks, vulnerabilities, and countermeasures that could affect your application. You can use threat modeling to shape your application's design, meet your company's security objectives, and reduce risk. | Threat modeling is an engineering technique you can use to help you identify threats, attacks, vulnerabilities, and countermeasures that could affect your application. You can use threat modeling to shape your application's design, meet your company's security objectives, and reduce risk. | ||
- | + | | | |
- | [[image:ThreatModelingSteps.gif]] | + | |} |
- | + | ---- | |
<!-- | <!-- | ||
[[Threats and Countermeasures]] | [[Threats and Countermeasures]] |
Current revision
Getting Started
Terminology
|
How Tos
Templates
Walkthroughs
|