This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Application Threat Modeling"
From OWASP
Line 1: | Line 1: | ||
+ | [[OWASP Code Review Guide Table of Contents]]__TOC__ | ||
+ | |||
===Introduction=== | ===Introduction=== | ||
DREAD | DREAD | ||
Line 20: | Line 22: | ||
Planning a security assessment or code review based on the threat model deleverable. | Planning a security assessment or code review based on the threat model deleverable. | ||
+ | |||
+ | [[Category:OWASP Code Review Project]] |
Revision as of 12:26, 29 May 2008
OWASP Code Review Guide Table of ContentsIntroduction
DREAD STRIDE
Identify threats
Understand discovered threats
Threat categorization / Business impact
Data Flow Diagrams
Countermeasures
Assessment
Planning a security assessment or code review based on the threat model deleverable.