![]() ![]() In addition to producing a model, typical threat modeling efforts also produce a prioritized list of security improvements to the concept, requirements, design, or implementation of an application. Applied to software, it enables informed decision-making about application security risks. Threat modeling is a process for capturing, organizing, and analyzing all of this information. A way of validating the model and threats, and verification of success of actions taken.Actions that can be taken to mitigate each threat. ![]() Assumptions that can be checked or challenged in the future as the threat landscape changes. ![]()
0 Comments
Leave a Reply. |