News

Attack trees or data flow diagrams can be drawn with pen and paper. As this presentation from Luca Bongiorni explains, some of the most popular tools for threat modeling are Microsoft Visio and Excel.
Having a clear understanding of where your data is being consumed is a critical first step toward being able to secure and ultimately protect it. Using data flow diagrams, it is possible to know the ...
A data-flow diagram is the best way of representing a flow of data through a process or a system. Such a diagram will provide information about the outputs and inputs of each entity and the ...