Site Loader

This article is particularly identified with the exchange of the distinctive sorts of threat modelling approaches which can be utilized to distinguish potential dangers to a System or digital model, and can be utilized as a required activity for a DoD acquisition. Three methodologies in particular STRIDE, Security cards and Persona non Grata have been looked at and the aftereffects of each methodology are talked about in this Article. A drone system with a little IT support framework has been utilized as a model. Consequences of every one of the strategies have been investigated dependent on number of threats recognized, number of threats missed and number of false positives revealed.

Post Author: admin


I'm Eugene!

Would you like to get a custom essay? How about receiving a customized one?

Check it out