Carnegie Mellon University
Browse

Threat Modeling: Protecting Our Nation’s Software-Intensive Systems

Download (330.86 kB)
<p dir="ltr">While understanding cyber threats to complex software intensive systems is important, identifying threats and mitigations to them early in the design of a system helps reduce the cost to fixt them. In response to Executive Order (EO) 14028, <i>Improving the Nation’s Cybersecurity</i>, the National Institute of Standards and Technology (NIST) recommended 11 practices for software verification. Threat modeling is at the top of the list. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Natasha Shevchenko and Alex Vesey, both engineers with the SEI’s CERT Division, sit down with Timothy Chick, technical manager of CERT’s Applied Systems Group, to discuss how threat modeling can be used to protect software-intensive systems from attack. Specifically, they explore how threat models can guide system requirements, system design, and operational choices to identify and mitigate threats.</p>

History

Related Materials

  1. 1.
    DOI - Is original form of SEI podcast

Copyright Statement

Audiovisual published 2025 via Software Engineering Institute, Carnegie Mellon University

Usage metrics

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC