Which threat modeling methodology involves creating or using collections of similar threats?
Data Flow Diagrams
Attack Libraries
Attack Trees
Security Profile
Submit