diff --git a/contributions/scientific-paper/week6/liley-eusebiu/README.md b/contributions/scientific-paper/week6/liley-eusebiu/README.md new file mode 100644 index 0000000000..c20788701a --- /dev/null +++ b/contributions/scientific-paper/week6/liley-eusebiu/README.md @@ -0,0 +1,27 @@ +# Assignment Proposal + +## Title + +Yet another cybersecurity risk assessment framework + +## Names and KTH ID + + - Eusebiu Volostiuc (eusebiu@kth.se) + - Jonas Liley (liley@kth.se) + +## Deadline + +- Week 6 + +## Category + +- Scientific paper + +## Description + +Threat Modeling is an integral part of the planning and design stages in the DevSecOps cycle and keeps being highly relevant in later stages of a product development cycle. We want to explain the basics of Threat Modeling, the main motivations behind it, and the methodology on how to perform Threat Modeling which is explained in the chosen paper: https://link.springer.com/article/10.1007/s10207-023-00713-y + +**Relevance** + +Threat Modeling is a highly relevant methodology which allows modeling and security testing of software "on paper". It can help with identifying security vulnerabilities in early stages of the development, making them easier and cheaper to fix. Additionally it provides a high value when working with constraint budgets, allowing security practitioners and decision makers to prioritize effectively. +