ADVERTISEMENT

Home|Journals|Articles by Year|Audio Abstracts
 

Review Article



The Art of Threat Modeling

Amir Hammami.




Abstract
Cited by 0 Articles

Cybersecurity relies on threat modeling to forecast and mitigate security attacks. This research analyses alternative threat modeling methods to fill gaps in existing methods. We conducted a thorough literature analysis and used Microsoft's threat modeling technique to a real-world cybersecurity situation. Key results emphasize the applicability of different methodologies in various circumstances by highlighting their strengths and drawbacks. This research provides insights on tailoring threat modeling methodologies for industry standards, demands, and system features. We include performance data to assess each approach, improving technical substance and clarity. Case studies show how threat modeling may be used in different contexts, guaranteeing uniform formatting and style.

Key words: Threat modeling, threats, cybersecurity






Full-text options


Share this Article


Online Article Submission
• ejmanager.com




ejPort - eJManager.com
Author Tools
About BiblioMed
License Information
Terms & Conditions
Privacy Policy
Contact Us

The articles in Bibliomed are open access articles licensed under Creative Commons Attribution 4.0 International License (CC BY), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.