Useful Links
1. Introduction to Threat Modeling
2. The Threat Modeling Process Overview
3. System Decomposition and Modeling
4. Threat Identification and Enumeration
5. Threat Analysis and Risk Assessment
6. Validation and Verification
7. Integrating Threat Modeling into the Development Lifecycle
8. Domain-Specific Threat Modeling
9. Tooling and Automation
10. Scaling a Threat Modeling Program
  1. Computer Science
  2. Cybersecurity

Threat Modeling

1. Introduction to Threat Modeling
2. The Threat Modeling Process Overview
3. System Decomposition and Modeling
4. Threat Identification and Enumeration
5. Threat Analysis and Risk Assessment
6. Validation and Verification
7. Integrating Threat Modeling into the Development Lifecycle
8. Domain-Specific Threat Modeling
9. Tooling and Automation
10. Scaling a Threat Modeling Program
  1. The Threat Modeling Process Overview
    1. The Four Key Questions
      1. What are we working on?
        1. System Identification
          1. Asset Inventory
          2. What can go wrong?
            1. Threat Enumeration
              1. Attack Scenarios
              2. What are we going to do about it?
                1. Mitigation Planning
                  1. Control Selection
                  2. Did we do a good job?
                    1. Validation Techniques
                      1. Metrics and Feedback
                    2. Common Process Models
                      1. Microsoft SDL Threat Modeling Process
                        1. Steps and Artifacts
                          1. Integration with SDL Phases
                          2. VAST Methodology
                            1. Visual Modeling
                              1. Agile Integration
                                1. Scalability Considerations

                            Previous

                            1. Introduction to Threat Modeling

                            Go to top

                            Next

                            3. System Decomposition and Modeling

                            © 2025 Useful Links. All rights reserved.

                            About•Bluesky•X.com