Threat Modelling#

This repository contains structured notes and exercises developed alongside the study of threat modelling. The material is largely derived from Adam Shostack’s Threat Modeling: Designing for Security.

The focus is on:

  • introduction to threat modelling;
  • threat identification techniques;
  • threat mitigation techniques;
  • and case studies.

All referenced source material is listed below.


References#

[1] A. Shostack, Threat Modeling: Designing for Security, Wiley, 2014. [Online]. Available: https://public.magendanz.com/Temp/Threat%20Modeling%20-%20Shostack,%20Adam.pdf. Accessed: Mar. 30, 2026.

[2] R. Anderson, Security Engineering, Wiley, 2020. [Online]. Available at: https://www.cl.cam.ac.uk/archive/rja14/Papers/SEv3.pdf. Accessed Apr. 20, 2026.