This article is particularly identified with the exchange of the distinctive sorts of threat modelling approaches which can be utilized to distinguish potential dangers to a System or digital model, and can be utilized as a required activity for a DoD acquisition. Three methodologies in particular STRIDE, Security cards and Persona non Grata have been looked at and the aftereffects of each methodology are talked about in this Article. A drone system with a little IT support framework has been utilized as a model. Consequences of every one of the strategies have been investigated dependent on number of threats recognized, number of threats missed and number of false positives revealed.


I'm James!

Would you like to get a custom essay? How about receiving a customized one?

Check it out