Microsoft free threat modeling tool9/20/2023 Note that in this example has been worked out using the original LINDDUN and thus not take into account the updated LINDDUN trees or the updated fifth step (mitigation strategies) of the methodology.Ī more extensive execution of LINDDUN is the step-by-step application of (the original) LINDDUN to a patient community system (steps 1-4). The full running example is available in the LINDDUN paper. ![]() These examples thus do not yet take into account the updated solution-oriented steps, nor do they consider the updated LINDDUN threat trees, as they closely follow the methodology and threat trees described in the original LINDDUN paper. Note that currently these examples are still based on the original LINDDUN methodology and LINDDUN threat trees. Below you can find a number of worked out examples of the LINDDUN methodology.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |