Skip to content

Commit

Permalink
Update Threat-modeling.md
Browse files Browse the repository at this point in the history
  • Loading branch information
RiieCco authored Jul 12, 2023
1 parent cb9e891 commit 642249c
Showing 1 changed file with 2 additions and 1 deletion.
3 changes: 2 additions & 1 deletion .gitbook/assets/python/Threat-modeling/Threat-modeling.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,11 +20,12 @@ Threat modeling answers the following four key questions:

## Approaches to Threat Modeling

There are three general approaches to threat modeling:
There are four general approaches to threat modeling:

1. **Asset-centric:** This approach starts by identifying and classifying a system's assets, and then focuses on the threats to those assets.
2. **System-centric (or architecture-centric):** This approach focuses on the system's design and components, and their interactions. It identifies threats based on the attack surface exposed by the system's architecture.
3. **Attacker-centric:** This approach starts by assuming the perspective of the attacker, their skills, motives, and objectives, and then identifies threats based on what parts of the system the attacker would likely target.
4. **List-centric:** List-centric approaches to threat modeling, using tools such as the Application Security Verification Standard (ASVS) from the Open Web Application Security Project (OWASP), provide a systematic and comprehensive checklist for evaluating the security of software applications.

## Requirements Traceability Matrix (RTM)

Expand Down

0 comments on commit 642249c

Please sign in to comment.