ATASM |
Architecture, Threats, Attack Surfaces, and Mitigations |
Threat Models |
DREAD |
Damage, Reproducibility, Exploitability, Affected Users, and Discoverability |
Threat Models |
PASTA |
Process for Attack Simulation and Threat Analysis |
Threat Models |
STRIDE |
Spoofing, Tampering, Repudiation, Information Disclosure, Denial-of-Service, and Elevation of Privilege |
Threat Models |