This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Application Threat Modeling"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 +
[[OWASP Code Review Guide Table of Contents]]__TOC__
 +
 
===Introduction===
 
===Introduction===
 
DREAD
 
DREAD
Line 20: Line 22:
  
 
Planning a security assessment or code review based on the threat model deleverable.
 
Planning a security assessment or code review based on the threat model deleverable.
 +
 +
[[Category:OWASP Code Review Project]]

Revision as of 12:26, 29 May 2008

OWASP Code Review Guide Table of Contents

Introduction

DREAD STRIDE

Identify threats

Understand discovered threats

Threat categorization / Business impact

Data Flow Diagrams

Countermeasures

Assessment

Planning a security assessment or code review based on the threat model deleverable.