1.Identify security objectives
+ Legislative Drivers
+ Contractual Requirements
+ Alignment with Business Objectives.
2.CIA Triad
3.Tools for Threat Modeling
+ Data Flow Diagrams
+ Use/Misuse cases
1.Identify security objectives
+ Legislative Drivers
+ Contractual Requirements
+ Alignment with Business Objectives.
2.CIA Triad
3.Tools for Threat Modeling
+ Data Flow Diagrams
+ Use/Misuse cases
0 Comments