Slide 23
Slide 23 text
References & read more
● Threat Modeling - Designing for Security, Adam Shostack
● Threat Modeling, Izar Tarandach and Matthew J. Coles
● OWASP Threat Modeling Process
● OWASP DevSecOps Guideline
● OWASP Threat Dragon
● Smart Home Threat Model (A Great Example)
* All icons are from FLATICON