This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Demystifying the Threat-Modeling Process
September/October 2005 (vol. 3 no. 5)
pp. 66-70
Peter Torr, Microsoft
If done early in the development life cycle, threat modeling can reveal architectural weaknesses that could require significant changes to your product. Making design changes early in the product life cycle is much cheaper than trying to make them at the end.
Index Terms:
threat modeling, software development, product development, threat environment, security
Citation:
Peter Torr, "Demystifying the Threat-Modeling Process," IEEE Security & Privacy, vol. 3, no. 5, pp. 66-70, Sept.-Oct. 2005, doi:10.1109/MSP.2005.119
Usage of this product signifies your acceptance of the Terms of Use.