





Threat Modeling-A Survey
Subscribe/Renew Journal
Generally, Security assessment is performed on applications after they are developed to identify issues and then required measures are taken to fix those issues. This can help but it is costlier approach to address the issues later. The steps run in multiple iterations and can be avoided if we take this issue earlier by finding the issues in the life cycle of the application development only. Here comes the role of Threat Modeling, which makes it possible to identify all potential threats to the software system in designing phase. Microsoft included Threat Modeling as a one of the practice in the Security Development Life-cycle to ensure that security built-in like identifying vulnerabilities, determining risks from the threats, and establishing appropriate mitigating methods can easily be identified more effectively and less expensively from the very beginning. The numerous works have been published on threat modeling. We examine the differences between modeling software tools and which is best suited for what and will discuss on the issues reported by Microsoft.
Keywords

Abstract Views: 311

PDF Views: 3