Threat Modeling
Blog Posts
Evaluating Threat-Modeling Methods for Cyber-Physical Systems
Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....
• By Nataliya Shevchenko
In Enterprise Risk and Resilience Management
![Nataliya Shevchenko](/media/images/thumb_big_n-shevchenko_blog_aut.max-180x180.format-webp.webp)
Threat Modeling: 12 Available Methods
Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....
• By Nataliya Shevchenko
In Enterprise Risk and Resilience Management
![Nataliya Shevchenko](/media/images/thumb_big_n-shevchenko_blog_aut.max-180x180.format-webp.webp)
The Hybrid Threat Modeling Method
Modern software systems are constantly exposed to attacks from adversaries that, if successful, could prevent a system from functioning as intended or could result in exposure of confidential information....
• By Nancy R. Mead, Forrest Shull
![Nancy Mead](/media/images/thumb_big_n-mead_blog_authors_5.max-180x180.format-webp.webp)
![Forrest Shull](/media/images/thumb_big_f-shull_blog_authors_.max-180x180.format-webp.webp)
Cyber Threat Modeling: An Evaluation of Three Methods
This SEI Blog post emphasizes rigorous, automated cyber threat modeling for DoD acquisition.
• By Forrest Shull, Nancy R. Mead
![Forrest Shull](/media/images/thumb_big_f-shull_blog_authors_.max-180x180.format-webp.webp)
![Nancy Mead](/media/images/thumb_big_n-mead_blog_authors_5.max-180x180.format-webp.webp)