GIVEN WHEN THEN as Attack Tree

βͺ▢️⏩ GIVEN WHEN THEN Threat Modeling

This is a proof of concept playground for GIVEN WHEN THEN Threat Modeling. We describe threat STEPs in a simple text format with GIVEN WHEN THEN style, approach it like an Attack Defense Tree, then experiment with simulations.

πŸ’‘ TL;DR / Lessons learned

ℹ️ What are some of the lessons learned?

πŸ‘£ Threat Model



πŸ€– Simulation

ℹ️ How does this simulation work?

🎲 SOURCEs (mentioned GIVEN, not THEN)

🎲 INTERMEDIATEs (mentioned GIVEN and THEN)

🏁 SINKs (mentioned THEN, not GIVEN)

🏁 EVENTs (mentioned WHEN)

πŸ’‘ Inspiration

ℹ️ What inspired this work?

🚚 Future Work

ℹ️ Discover what's next... (prioritized, important things first)
(If there's anything you are interested in, let me know... πŸ’¬)