This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Application Threat Modeling"

From OWASP
Jump to: navigation, search
(New page: ===Introduction=== DREAD STRIDE == Identify threats == == Understand discovered threats == == Threat categorization / Business impact == == Countermeasures == == Assessment == Pl...)
 
Line 10: Line 10:
  
 
== Threat categorization / Business impact ==
 
== Threat categorization / Business impact ==
 +
 +
== Data Flow Diagrams ==
  
  

Revision as of 12:25, 29 May 2008

Introduction

DREAD STRIDE

Identify threats

Understand discovered threats

Threat categorization / Business impact

Data Flow Diagrams

Countermeasures

Assessment

Planning a security assessment or code review based on the threat model deleverable.