Threat Modeling: A Summary of Available Methods
Abstract:
The twelve threat modeling methods discussed in this paper come from a variety of sources and target different parts of the process. No one threat modeling method is recommended over another the decision of which methods to use should be based on the needs of the project and its specific concerns.
Security Markings
DOCUMENT & CONTEXTUAL SUMMARY
Distribution:
Approved For Public Release
Distribution Statement:
Approved For Public Release;
RECORD
Collection: TR