This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Application Threat Modeling"
From OWASP
(New page: ===Introduction=== DREAD STRIDE == Identify threats == == Understand discovered threats == == Threat categorization / Business impact == == Countermeasures == == Assessment == Pl...) |
|||
Line 10: | Line 10: | ||
== Threat categorization / Business impact == | == Threat categorization / Business impact == | ||
+ | |||
+ | == Data Flow Diagrams == | ||
Revision as of 12:25, 29 May 2008
Introduction
DREAD STRIDE
Identify threats
Understand discovered threats
Threat categorization / Business impact
Data Flow Diagrams
Countermeasures
Assessment
Planning a security assessment or code review based on the threat model deleverable.