Threat Modelling#
This repository contains structured notes and exercises developed alongside the study of threat modelling. The material is largely derived from Adam Shostack’s Threat Modeling: Designing for Security.
The focus is on:
- introduction to threat modelling;
- threat identification techniques;
- threat mitigation techniques;
- and case studies.
All referenced source material is listed below.
References#
[1] A. Shostack, Threat Modeling: Designing for Security, Wiley, 2014. [Online]. Available: https://public.magendanz.com/Temp/Threat%20Modeling%20-%20Shostack,%20Adam.pdf. Accessed: Mar. 30, 2026.
[2] R. Anderson, Security Engineering, Wiley, 2020. [Online]. Available at: https://www.cl.cam.ac.uk/archive/rja14/Papers/SEv3.pdf. Accessed Apr. 20, 2026.