<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Threat Modeling </title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Threat Modeling </description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/threat-modeling/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 04 Feb 2019 00:00:00 -0500</lastBuildDate><item><title>Evaluating Threat-Modeling Methods for Cyber-Physical Systems</title><link>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 04 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Threat Modeling: 12 Available Methods</title><link>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 03 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>The Hybrid Threat Modeling Method</title><link>https://www.sei.cmu.edu/blog/the-hybrid-threat-modeling-method/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Modern software systems are constantly exposed to attacks from adversaries that, if successful, could prevent a system from functioning as intended or could result in exposure of confidential information....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nancy Mead, Forrest Shull</dc:creator><pubDate>Mon, 23 Apr 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-hybrid-threat-modeling-method/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Threat Modeling </category></item><item><title>Cyber Threat Modeling: An Evaluation of Three Methods</title><link>https://www.sei.cmu.edu/blog/cyber-threat-modeling-an-evaluation-of-three-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post emphasizes rigorous, automated cyber threat modeling for DoD acquisition.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Forrest Shull, Nancy Mead</dc:creator><pubDate>Fri, 11 Nov 2016 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/cyber-threat-modeling-an-evaluation-of-three-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Threat Modeling </category></item></channel></rss>