The Software, the Examples, and every information provided on this Site are covered by a License: click here to access it.
Usage of any material provided implies acceptance of the License.
EXAMPLES ARE PROVIDED “AS THEY ARE”. NO WARRANTY OF ANY TYPE IS PROVIDED. NO SUPPORT IS PROVIDED FOR EXAMPLES.
Examples cover some common scenarios and show how it may be possible to use Threats Manager Studio.
They are not perfect: they are typically focused on simplified systems and have not the typical quality you would expect from a real Threat Model. Still, they can be leveraged to learn how to be a better Threat Modeler, and some of them are discussed in Posts published on this site.
For your convenience, we have collected here some Examples.
When possible, we have included multiple links:
- Download, allows to download the example file, in TM or TMJ format.
- Download Reference Word File is the Reference Word File used to generate the Example Report.
- Download Example Report is the Word Report generated for the Example File.
|Azure DevOps Core||Simone Curzi||1.0||Download SHA256|
Download Reference Word File SHA256
Download Example Report SHA256
If you have Examples you want to share with the Community, please upload them here.