Three popular ways to structure threat identification, scoring, and risk process.
Originally from Microsoft, STRIDE labels threats so you do not miss major classes. Below: mnemonic “icon” and an e-commerce example for each.
Damage, Reproducibility, Exploitability, Affected users, Discoverability. Move the sliders to see a sample aggregate (average × 10 for a simple “score out of 100”).
Organizations often customize weights or replace DREAD with CVSS—use this tab to teach the idea of multidimensional risk, not a single universal formula.
Process for Attack Simulation and Threat Analysis: aligns technical threats with business impact and testing.
Pipeline visualization — seven stages left-to-right (scroll on small screens).
| Framework | Primary use | Output | Good fit when |
|---|---|---|---|
| STRIDE | Label threat types | Checklist of categories | Design reviews, DFDs, training devs |
| DREAD | Prioritize findings | Numeric / relative ranking | Comparing similar issues; discussion starter |
| PASTA | End-to-end risk process | Business-aligned risk cases | Mature programs, pen test integration |