Threat Model

From Guidance Share

Jump to: navigation, search

A threat model helps to show threats, attacks, and vulnerabilities in context. The most important elements of a threat model include deployment topology, trust boundaries, entry and exit points, a list of threats, and a list of vulnerabilities. You use the model to help identify key risks and to help evaluate trade-offs.


Resources


See Also

Personal tools