Skip to content

Commit 9ebd544

Browse files
Jonas-LileyJonas Liley
andauthored
Week 6: Scientific paper proposal (#2402)
* Added proposal * Week 6: Scientific paper proposal --------- Co-authored-by: Jonas Liley <[email protected]>
1 parent d895fc4 commit 9ebd544

File tree

1 file changed

+27
-0
lines changed
  • contributions/scientific-paper/week6/liley-eusebiu

1 file changed

+27
-0
lines changed
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
# Assignment Proposal
2+
3+
## Title
4+
5+
Yet another cybersecurity risk assessment framework
6+
7+
## Names and KTH ID
8+
9+
- Eusebiu Volostiuc ([email protected])
10+
- Jonas Liley ([email protected])
11+
12+
## Deadline
13+
14+
- Week 6
15+
16+
## Category
17+
18+
- Scientific paper
19+
20+
## Description
21+
22+
Threat Modeling is an integral part of the planning and design stages in the DevSecOps cycle and keeps being highly relevant in later stages of a product development cycle. We want to explain the basics of Threat Modeling, the main motivations behind it, and the methodology on how to perform Threat Modeling which is explained in the chosen paper: https://link.springer.com/article/10.1007/s10207-023-00713-y
23+
24+
**Relevance**
25+
26+
Threat Modeling is a highly relevant methodology which allows modeling and security testing of software "on paper". It can help with identifying security vulnerabilities in early stages of the development, making them easier and cheaper to fix. Additionally it provides a high value when working with constraint budgets, allowing security practitioners and decision makers to prioritize effectively.
27+

0 commit comments

Comments
 (0)