Threat modeling methodologies
Threat modeling methodologies are processes that are put in place by some expert security organizations to facilitate the threat modeling process. Although organizations can develop threat modeling methodologies, several existing methods are ready to be used. The methodology you choose depends on the threat to be modeled. Several methodologies are used for threat modeling, such as STRIDE (https://bit.ly/3yKJzvP), DREAD, PASTA, TRIKE, VAST, OCTAVE, and CVSS (NIST). In this section, we will look at the STRIDE and NIST methodologies and how they work.
Important Note
As an analyst, it is essential to know about the rest of the methodologies and how they can be applied to your threat modeling exercises. We are not going to cover all these methodologies in detail.
Damage, Reproducibility, Exploitability, Affected users, Discoverability (DREAD) is also a threat model methodology or risk assessment framework developed by Microsoft. The methodology uses...