Threat Modeling

  • Authors:
  • Frank Swiderski;Window Snyder

  • Affiliations:
  • -;-

  • Venue:
  • Threat Modeling
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Delve into the threat modeling methodology used by Microsoft's security experts to identify security risks, verify an application's security architecture, and develop countermeasures in the design, coding, and testing phases.