Summary

In this chapter, we learned about threat modeling, the benefits of threat modeling, and its terminology. We also learned about different threat modeling techniques, such as STRIDE and DREAD, and tools such as the Microsoft Threat Modeling Tool and SeaSponge.