Threat Modeling: A Summary of Available Methods
Technical Report,01 Jan 1999,31 Jan 2002
Carnegie Mellon University Software Engineering Institute Pittsburgh United States
Pagination or Media Count:
The twelve threat modeling methods discussed in this paper come from a variety of sources and target different parts of the process. No one threat modeling method is recommended over another the decision of which methods to use should be based on the needs of the project and its specific concerns.