This article is specifically related to the discussion of the different types of threat modeling approaches which can be used to identify potential threats to a System or cyber model

This article is specifically related to the discussion of the different types of threat modeling approaches which can be used to identify potential threats to a System or cyber model, and can be used as a required action for a DoD acquisition. Three approaches namely STRIDE, Security cards and Persona non Grata have been compared and the results of each approach are discussed in this Article. A drone system with a small IT maintenance system has been used as a model. Results of each of the methods have been analyzed based on number of threats identified, number of threats missed and number of false positives reported.

x

Hi!
I'm Dora

Would you like to get a custom essay? How about receiving a customized one?

Check it out
x

Hi!
I'm Barry!

Would you like to get a custom essay? How about receiving a customized one?

Check it out