This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Application Threat Modeling
From OWASP
Introduction
DREAD STRIDE
Identify threats
Understand discovered threats
Threat categorization / Business impact
Data Flow Diagrams
Countermeasures
Assessment
Planning a security assessment or code review based on the threat model deleverable.