Statements (22)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:threat_modeling_framework
|
| gptkbp:abbreviation |
Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege
|
| gptkbp:appliesTo |
software security
|
| gptkbp:category |
cybersecurity
|
| gptkbp:component |
gptkb:Denial_of_Service
Tampering Spoofing Information Disclosure Elevation of Privilege Repudiation |
| gptkbp:developedBy |
gptkb:Microsoft
|
| gptkbp:documentedIn |
Microsoft Security Development Lifecycle
|
| gptkbp:focusesOn |
threat identification
|
| gptkbp:introducedIn |
1999
|
| gptkbp:relatedTo |
DREAD model
OCTAVE methodology PASTA methodology |
| gptkbp:usedFor |
identifying security threats
|
| gptkbp:usedIn |
software development lifecycle
|
| gptkbp:bfsParent |
gptkb:OWASP_Threat_Dragon
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
STRIDE methodology
|