Threat Modelling

vulnerability

Asset Identification


attack tree

T1190

Initial Access

31

13

Damage

Discoverability

Affected Users

CIA Triad

Confidentiality

Tampering

Denial of Service

THM{m0d3ll1ng_w1th_STR1D3}

Decompose the Application

Analyse the Attacks

Define the Technical Scope

THM{c00k1ng_thr34ts_w_P4ST4}