Definition:
Importance:
Necessity of Threat Modeling:
Assemble Resources
Decompose the System
Identify Threats
Rank Threats
Make a Response Plan
Mitigate the Threats
Interactors:
Flow:
Processors:
Storage:
Trust Boundaries:
Spoofing:
Tampering:
Repudiation:
Information Disclosure:
Denial of Service (DoS):
Elevation of Privileges:
Description:
Example Process: