1. Home
  2. /
  3. Downloads
  4. /
  5. Examples

IMPORTANT
The Software, the Examples, and every information provided on this Site are covered by a License: click here to access it.
Usage of any material provided implies acceptance of the License.
EXAMPLES ARE PROVIDED “AS THEY ARE”. NO WARRANTY OF ANY TYPE IS PROVIDED. NO SUPPORT IS PROVIDED FOR EXAMPLES.

Examples cover some common scenarios and show how it may be possible to use Threats Manager Studio.

They are not perfect: they are typically focused on simplified systems and have not the typical quality you would expect from a real Threat Model. Still, they can be leveraged to learn how to be a better Threat Modeler, and some of them are discussed in Posts published on this site.


For your convenience, we have collected here some Examples.

When possible, we have included multiple links:

  • Download, allows to download the example file, in TM or TMJ format.
  • Download Reference Word File is the Reference Word File used to generate the Example Report.
  • Download Example Report is the Word Report generated for the Example File.
ExampleAuthorVerLink
Azure DevOps CoreSimone Curzi1.0Download SHA256
2D9636C5A4277D76FCA5212740E6E5722EF78CE7B6D12D6AA2372C79C4107862

Download Reference Word File SHA256
71C7B69B7895DC6E7A14CC398984BAEFEA7847C537D97EA15F2C9A8112EB2AF6

Download Example Report SHA256
154366ACB83B17017646533A3A5031467B3333E2E3BA945E66B6A51158FFC5E4

If you have Examples you want to share with the Community, please upload them here.