This article is specifically related to the various types of threat modeling approaches which can be used to recognize potential threats to a System or cyber model

This article is specifically related to the various types of threat modeling approaches which can be used to recognize potential threats to a System or cyber model, and can be used as a required action for a DoD securing. Three systems specifically STRIDE, Persona non Grata and security cards have been taken and the eventual outcomes of every methodology are discussed in this Article. A drone framework with a little IT infrastructure has been used as a model. Outcomes of all of the methodologies have been examined subject to number of threats perceived, number of threats missed and number of false positives reported.

x

Hi!
I'm Dora

Would you like to get a custom essay? How about receiving a customized one?

Check it out
x

Hi!
I'm Barry!

Would you like to get a custom essay? How about receiving a customized one?

Check it out