Demystifying the Threat-Modeling Process

  • Authors:
  • Peter Torr

  • Affiliations:
  • Microsoft

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

If done early in the development life cycle, threat modeling can revealarchitecturalweaknesses that could require significant changes to your product. Making design changes early in the product life cycle is much cheaper than trying to make them at the end.