Threat Modeling
Blog Posts
Evaluating Threat-Modeling Methods for Cyber-Physical Systems
Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....
• By Nataliya Shevchenko
In Enterprise Risk and Resilience Management
Threat Modeling: 12 Available Methods
Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....
• By Nataliya Shevchenko
In Enterprise Risk and Resilience Management
The Hybrid Threat Modeling Method
Modern software systems are constantly exposed to attacks from adversaries that, if successful, could prevent a system from functioning as intended or could result in exposure of confidential information....
• By Nancy R. Mead, Forrest Shull
Cyber Threat Modeling: An Evaluation of Three Methods
This SEI Blog post emphasizes rigorous, automated cyber threat modeling for DoD acquisition.