News
Attack trees or data flow diagrams can be drawn with pen and paper. As this presentation from Luca Bongiorni explains, some of the most popular tools for threat modeling are Microsoft Visio and Excel.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results