Threat Modeling Cheat Sheet

From OWASP
Revision as of 23:50, 6 November 2011 by Jmanico (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Contents

Introduction

Application Security Threat Modeling

Steps

Define Asset/Target

Motive

Threat Enumeration

Application Decomposition

Attack Tree

Vulnerability/Exploit Mapping

Application Testing

Remediation/Countermeasures

Related Articles

OWASP Cheat Sheets Project Homepage

Developer Cheat Sheets (Builder)

Assessment Cheat Sheets (Breaker)

Mobile Cheat Sheets

OpSec Cheat Sheets (Defender)

Draft Cheat Sheets

Authors and Primary Editors