2010
DOI: 10.1109/msp.2010.110
|View full text |Cite
|
Sign up to set email alerts
|

Threat Modeling - Perhaps It's Time

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…Developers begin by creating simple diagrams and tables to provide an overview of the system being threat modeled. These diagrams can clarify different interdependencies and features of systems, which are particularly important for smart, internet-connected devices (Steven, 2010). For tech designers and vendors, these visual representations form a useful way to abstract all system properties and diagnose what an application does (Coles & Tarandach, 2020).…”
Section: System: What Are You Building?mentioning
confidence: 99%
“…Developers begin by creating simple diagrams and tables to provide an overview of the system being threat modeled. These diagrams can clarify different interdependencies and features of systems, which are particularly important for smart, internet-connected devices (Steven, 2010). For tech designers and vendors, these visual representations form a useful way to abstract all system properties and diagnose what an application does (Coles & Tarandach, 2020).…”
Section: System: What Are You Building?mentioning
confidence: 99%
“…Threat modeling process is also a collaborative process where participants include: business stakeholders; productteam members from all product development phases, such as enterprise, software and application architects, development leads, IT infrastructure specialists, engineers; security experts such as security analysts, security architects, threat modeling experts [31], [33].…”
Section: A Threat Modeling Definitionmentioning
confidence: 99%
“…Threat modeling is important because it helps in 1) identifying business-logic flaws and other critical vulnerabilities that expose core business assets, 2) enriching assessments with new potential attack vectors, 3) prioritizing the types of attacks to address 4) mitigating the risks more effectively and 5) fixing issues early in the development process [31], [34].…”
Section: A Threat Modeling Definitionmentioning
confidence: 99%
See 2 more Smart Citations