File tree Expand file tree Collapse file tree 18 files changed +110
-17
lines changed
Expand file tree Collapse file tree 18 files changed +110
-17
lines changed Original file line number Diff line number Diff line change 6161- title : ' 4.1.3 Threat Dragon'
6262 url : design/threat_modeling/threat_dragon
6363
64- - title : ' 4.1.4 Threat Modeling and Cornucopia'
64+ - title : ' 4.1.4 Cornucopia'
6565 url : design/threat_modeling/cornucopia
6666
67+ - title : ' 4.1.5 LINDDUN GO'
68+ url : design/threat_modeling/linddun-go
69+
6770- title : ' 4.1.6 Threat Modeling toolkit'
6871 url : design/threat_modeling/toolkit
6972
Original file line number Diff line number Diff line change 6161- title : ' 4.1.3 Threat Dragon'
6262 url : design/threat_modeling/threat_dragon
6363
64- - title : ' 4.1.4 Threat Modeling and Cornucopia'
64+ - title : ' 4.1.4 Cornucopia'
6565 url : design/threat_modeling/cornucopia
6666
67+ - title : ' 4.1.5 LINDDUN GO'
68+ url : design/threat_modeling/linddun-go
69+
6770- title : ' 4.1.6 Threat Modeling toolkit'
6871 url : design/threat_modeling/toolkit
6972
Original file line number Diff line number Diff line change @@ -37,7 +37,8 @@ permalink:
37374.1.1 [ Threat modeling in practice] ( #threat-modeling-in-practice )
38384.1.2 [ Pythonic Threat Modeling] ( #pythonic-threat-modeling )
39394.1.3 [ Threat Dragon] ( #threat-dragon )
40- 4.1.4 [ Threat Modeling and Cornucopia] ( #cornucopia )
40+ 4.1.4 [ Cornucopia] ( #cornucopia )
41+ 4.1.5 [ LINDDUN GO] ( #linddun-go )
41424.1.6 [ Threat Modeling toolkit] ( #threat-modeling-toolkit )
42434.2 [ Web application checklist] ( #web-application-checklist )
43444.2.1 [ Checklist: Define Security Requirements] ( #checklist-define-security-requirements )
Original file line number Diff line number Diff line change @@ -50,7 +50,8 @@ Sections:
50504.1.1 [ Threat modeling in practice] ( #threat-modeling-in-practice )
51514.1.2 [ Pythonic Threat Modeling] ( #pythonic-threat-modeling )
52524.1.3 [ Threat Dragon] ( #threat-dragon )
53- 4.1.4 [ Threat Modeling and Cornucopia] ( #cornucopia )
53+ 4.1.4 [ Cornucopia] ( #cornucopia )
54+ 4.1.5 [ LINDDUN GO] ( #linddun-go )
54554.1.6 [ Threat Modeling toolkit] ( #threat-modeling-toolkit )
55564.2 [ Web application checklist] ( #web-application-checklist )
56574.2.1 [ Checklist: Define Security Requirements] ( #checklist-define-security-requirements )
Original file line number Diff line number Diff line change @@ -31,7 +31,8 @@ Sections:
31314.1.1 [ Threat modeling in practice] ( #threat-modeling-in-practice )
32324.1.2 [ Pythonic Threat Modeling] ( #pythonic-threat-modeling )
33334.1.3 [ Threat Dragon] ( #threat-dragon )
34- 4.1.4 [ Threat Modeling and Cornucopia] ( #cornucopia )
34+ 4.1.4 [ Cornucopia] ( #cornucopia )
35+ 4.1.5 [ LINDDUN GO] ( #linddun-go )
35364.1.6 [ Threat Modeling toolkit] ( #threat-modeling-toolkit )
3637
3738----
Original file line number Diff line number Diff line change @@ -12,7 +12,7 @@ permalink: /draft/design/threat_modeling/cornucopia/
1212
1313{% include breadcrumb.html %}
1414
15- ### 4.1.4 Threat Modeling and Cornucopia
15+ ### 4.1.4 Cornucopia
1616
1717OWASP Cornucopia is a card game used to help derive application security requirements
1818during the software development life cycle.
Original file line number Diff line number Diff line change @@ -12,7 +12,7 @@ permalink: /draft/design/threat_modeling/linddun-go/
1212
1313{% include breadcrumb.html %}
1414
15- ### 4.1.4 Threat Modeling and LINDDUN GO
15+ ### 4.1.5 LINDDUN GO
1616
1717LINNDUN GO is a card game used to help derive privacy requirements during the software development life cycle.
1818The LINNDUN GO card set can be [ downloaded] [ linddun-go-cards ] as a PDF and then printed out.
Original file line number Diff line number Diff line change @@ -32,7 +32,8 @@ Sections:
32324.1.1 [ Threat modeling in practice] ( 01-threat-modeling.md )
33334.1.2 [ Pythonic Threat Modeling] ( 02-pytm.md )
34344.1.3 [ Threat Dragon] ( 03-threat-dragon.md )
35- 4.1.4 [ Threat Modeling and Cornucopia] ( 04-cornucopia.md )
35+ 4.1.4 [ Cornucopia] ( 04-cornucopia.md )
36+ 4.1.5 [ LINDDUN GO] ( 05-linddun-go.md )
36374.1.6 [ Threat Modeling toolkit] ( 06-toolkit.md )
3738
3839----
Original file line number Diff line number Diff line change @@ -45,7 +45,8 @@ Sections:
45454.1.1 [ Threat modeling in practice] ( 01-threat-modeling/01-threat-modeling.md )
46464.1.2 [ Pythonic Threat Modeling] ( 01-threat-modeling/02-pytm.md )
47474.1.3 [ Threat Dragon] ( 01-threat-modeling/03-threat-dragon.md )
48- 4.1.4 [ Threat Modeling and Cornucopia] ( 01-threat-modeling/04-cornucopia.md )
48+ 4.1.4 [ Cornucopia] ( 01-threat-modeling/04-cornucopia.md )
49+ 4.1.5 [ LINDDUN GO] ( 01-threat-modeling/05-linddun-go.md )
49504.1.6 [ Threat Modeling toolkit] ( 01-threat-modeling/06-toolkit.md )
50514.2 [ Web application checklist] ( 02-web-app-checklist/toc.md )
51524.2.1 [ Checklist: Define Security Requirements] ( 02-web-app-checklist/01-define-security-requirements.md )
Original file line number Diff line number Diff line change @@ -41,7 +41,8 @@ This draft version has the latest contributions to the Developer Guide so expect
41414.1.1 [ Threat modeling in practice] ( 06-design/01-threat-modeling/01-threat-modeling.md )
42424.1.2 [ Pythonic Threat Modeling] ( 06-design/01-threat-modeling/02-pytm.md )
43434.1.3 [ Threat Dragon] ( 06-design/01-threat-modeling/03-threat-dragon.md )
44- 4.1.4 [ Threat Modeling and Cornucopia] ( 06-design/01-threat-modeling/04-cornucopia.md )
44+ 4.1.4 [ Cornucopia] ( 06-design/01-threat-modeling/04-cornucopia.md )
45+ 4.1.5 [ LINDDUN GO] ( 06-design/01-threat-modeling/05-linddun-go.md )
45464.1.6 [ Threat Modeling toolkit] ( 06-design/01-threat-modeling/06-toolkit.md )
46474.2 [ Web application checklist] ( 06-design/02-web-app-checklist/toc.md )
47484.2.1 [ Checklist: Define Security Requirements] ( 06-design/02-web-app-checklist/01-define-security-requirements.md )
You can’t perform that action at this time.
0 commit comments