Threat Modeling: A Summary of Available Methods

reportActive / Technical Report | Accession Number: AD1084024 | Open PDF

Abstract:

The twelve threat modeling methods discussed in this paper come from a variety of sources and target different parts of the process. No one threat modeling method is recommended over another the decision of which methods to use should be based on the needs of the project and its specific concerns.

Security Markings

DOCUMENT & CONTEXTUAL SUMMARY

Distribution:
Approved For Public Release
Distribution Statement:
Approved For Public Release;

RECORD

Collection: TR
Identifying Numbers
Subject Terms