Threat Modeling

1.Identify security objectives

    + Legislative Drivers

    + Contractual Requirements

    + Alignment with Business Objectives.

2.CIA Triad

3.Tools for Threat Modeling

    + Data Flow Diagrams

    + Use/Misuse cases

Post a Comment

Previous Post Next Post