Special Publication 800 154, Guide To Data Centric System Threat Ing NIST SP 154 Ing, 2016 03 14
User Manual:
Open the PDF directly: View PDF
Page Count: 25
- Executive Summary
- 1. Introduction
- 2. Attack and Defense Basics
- 3. Introduction to System and Data-Centric System Threat Modeling
- 4. Basics of Data-Centric System Threat Modeling
- 4.1 Step 1: Identify and Characterize the System and Data of Interest
- 4.2 Step 2: Identify and Select the Attack Vectors to Be Included in the Model
- 4.3 Step 3: Characterize the Security Controls for Mitigating the Attack Vectors
- 4.4 Step 4: Analyze the Threat Model
- 4.5 Customizing the Data-Centric System Threat Modeling Approach