Application Threat Modeling

From OWASP
Revision as of 07:26, 29 May 2008 by EoinKeary (talk | contribs)

Jump to: navigation, search
OWASP Code Review Guide Table of Contents

Introduction

DREAD STRIDE

Identify threats

Understand discovered threats

Threat categorization / Business impact

Data Flow Diagrams

Countermeasures

Assessment

Planning a security assessment or code review based on the threat model deleverable.