Threat Modeling
Blog Posts
Evaluating Threat-Modeling Methods for Cyber-Physical Systems
Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....
Read More•By Nataliya Shevchenko
In Enterprise Risk and Resilience Management
Threat Modeling: 12 Available Methods
Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....
Read More•By Nataliya Shevchenko
In Enterprise Risk and Resilience Management
The Hybrid Threat Modeling Method
Modern software systems are constantly exposed to attacks from adversaries that, if successful, could prevent a system from functioning as intended or could result in exposure of confidential information....
Read More•By Nancy R. Mead, Forrest Shull
Cyber Threat Modeling: An Evaluation of Three Methods
This SEI Blog post emphasizes rigorous, automated cyber threat modeling for DoD acquisition.
Read More