Abstract
Cybersecurity relies on threat modeling to forecast and mitigate security attacks. This research analyses alternative threat modeling methods to fill gaps in existing methods. We conducted a thorough literature analysis and used Microsoft's threat modeling technique to a real-world cybersecurity situation. Key results emphasize the applicability of different methodologies in various circumstances by highlighting their strengths and drawbacks. This research provides insights on tailoring threat modeling methodologies for industry standards, demands, and system features. We include performance data to assess each approach, improving technical substance and clarity. Case studies show how threat modeling may be used in different contexts, guaranteeing uniform formatting and style.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have