The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - September/October (2005 vol.3)
pp: 66-70
Peter Torr , Microsoft
ABSTRACT
If done early in the development life cycle, threat modeling can reveal architectural weaknesses that could require significant changes to your product. Making design changes early in the product life cycle is much cheaper than trying to make them at the end.
INDEX TERMS
threat modeling, software development, product development, threat environment, security
CITATION
Peter Torr, "Demystifying the Threat-Modeling Process", IEEE Security & Privacy, vol.3, no. 5, pp. 66-70, September/October 2005, doi:10.1109/MSP.2005.119
385 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool