2. STRIDE
The most mature method evaluates system design, identifies threats, and applies known threats based on its mnemonic name.
The most mature method evaluates system design, identifies threats, and applies known threats based on its mnemonic name.
3. LINDDUN
Focuses on privacy concerns, using a systematic approach to privacy assessment.
Identifies threats' applicability to the system by analyzing threat categories and building threat trees.
Focuses on privacy concerns, using a systematic approach to privacy assessment.
Identifies threats' applicability to the system by analyzing threat categories and building threat trees.
4. CVSS
The Common Vulnerability Scoring System (CVSS) provides a standardized scoring system for vulnerabilities.
Consists of three metric groups and is often combined with other threat-modeling methods.
The Common Vulnerability Scoring System (CVSS) provides a standardized scoring system for vulnerabilities.
Consists of three metric groups and is often combined with other threat-modeling methods.
5. Attack Trees
Attack trees depict attacks on a system in tree form, with the goal as the root and ways to achieve it as leaves.
This method is widely used with other techniques like STRIDE, CVSS, and PASTA.
Attack trees depict attacks on a system in tree form, with the goal as the root and ways to achieve it as leaves.
This method is widely used with other techniques like STRIDE, CVSS, and PASTA.
6. PnG
Persona non Grata focuses on human attackers' motivations and skills.
By understanding potential attackers' perspectives, PnG helps identify system vulnerabilities and fits well into Agile approaches.
Persona non Grata focuses on human attackers' motivations and skills.
By understanding potential attackers' perspectives, PnG helps identify system vulnerabilities and fits well into Agile approaches.
7. Security Cards
A brainstorming technique that helps identify unusual and complex attacks.
Use a deck of cards to answer questions about potential attacks and explore threat dimensions.
A brainstorming technique that helps identify unusual and complex attacks.
Use a deck of cards to answer questions about potential attacks and explore threat dimensions.
8. hTMM:
The Hybrid Threat Modeling Method combines SQUARE, Security Cards, and PnG activities.
It aims for consistent results, no false positives, and cost-effectiveness in threat modeling.
The Hybrid Threat Modeling Method combines SQUARE, Security Cards, and PnG activities.
It aims for consistent results, no false positives, and cost-effectiveness in threat modeling.
9. Quantitative Threat Modeling Method:
Combines attack trees, STRIDE, and CVSS to address complex interdependencies among components in cyber-physical systems.
It quantifies risk through component attack trees and CVSS scores.
Combines attack trees, STRIDE, and CVSS to address complex interdependencies among components in cyber-physical systems.
It quantifies risk through component attack trees and CVSS scores.
10. Trike:
A security audit framework that uses threat modeling.
It defines system requirements, builds actor-asset-action matrices, and generates attack trees to assess risks from privilege elevations and denials of service.
A security audit framework that uses threat modeling.
It defines system requirements, builds actor-asset-action matrices, and generates attack trees to assess risks from privilege elevations and denials of service.
11. VAST Modeling
Based on an automated threat-modeling platform called ThreatModeler.
It creates application and operational threat models, integrating into the organization's development and DevOps lifecycles.
Based on an automated threat-modeling platform called ThreatModeler.
It creates application and operational threat models, integrating into the organization's development and DevOps lifecycles.
12. OCTAVE
The Operationally Critical Threat, Asset, and Vulnerability Evaluation is a risk-based method for cybersecurity.
It assesses organizational risks, infrastructure vulnerabilities, and develops security strategies and plans.
The Operationally Critical Threat, Asset, and Vulnerability Evaluation is a risk-based method for cybersecurity.
It assesses organizational risks, infrastructure vulnerabilities, and develops security strategies and plans.
Sources:
resources.sei.cmu.edu
resources.sei.cmu.edu
resources.sei.cmu.edu
insights.sei.cmu.edu
resources.sei.cmu.edu
resources.sei.cmu.edu
resources.sei.cmu.edu
resources.sei.cmu.edu
insights.sei.cmu.edu
resources.sei.cmu.edu
insights.sei.cmu.edu/blog/the-hybri…
The Hybrid Threat Modeling Method
Modern software systems are constantly exposed to attacks from adversaries that, if successful, coul...
resources.sei.cmu.edu/library/asset-…
cmu-wordmark
The result of this work is a set of test principles that can help Programs select the most appropria...
resources.sei.cmu.edu/library/asset-…
cmu-wordmark
These assets all relate to OCTAVE: What it is, how to use it, and its value.
resources.sei.cmu.edu/library/asset-…
cmu-wordmark
This paper discusses twelve threat modeling methods from a variety of sources that target different...
resources.sei.cmu.edu/library/asset-…
cmu-wordmark
Presents a hybrid method of threat modeling that attempts to meld the desirable features of three me...
Thanks for reading.
If you enjoyed this thread:
1. Follow me @RealTonyMao
2. RT the first tweet below to share it
If you enjoyed this thread:
1. Follow me @RealTonyMao
2. RT the first tweet below to share it
Loading suggestions...