Star 0

Abstract

There are many different approaches to threat modeling: methodologies, visual attack graphs, red teaming, security in the SDLC and more. The aim of this discussion is to understand the types of threat models in use; to categorize them and discuss when the different types of models are appropriate; and to brainstorm potential future work in creating better and more standardized threat models.