This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Threat Modeling
May/June 2010 (vol. 8 no. 3)
pp. 83-86
John Steven, Cigital
Many security managers avoid discussing threat modeling because they perceive it as expensive and difficult. However, threat modeling has become easier, just as it has become more important. Perhaps it's time for another look.
Index Terms:
threat modeling, top-N lists, OWASP, Elevation of Privilege, software engineering, security and privacy
Citation:
John Steven, "Threat Modeling," IEEE Security & Privacy, vol. 8, no. 3, pp. 83-86, May-June 2010, doi:10.1109/MSP.2010.110
Usage of this product signifies your acceptance of the Terms of Use.