The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2010 vol.8)
pp: 83-86
John Steven , Cigital
ABSTRACT
Many security managers avoid discussing threat modeling because they perceive it as expensive and difficult. However, threat modeling has become easier, just as it has become more important. Perhaps it's time for another look.
INDEX TERMS
threat modeling, top-N lists, OWASP, Elevation of Privilege, software engineering, security and privacy
CITATION
John Steven, "Threat Modeling", IEEE Security & Privacy, vol.8, no. 3, pp. 83-86, May/June 2010, doi:10.1109/MSP.2010.110
50 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool