| CPC G06F 21/577 (2013.01) [G06F 21/563 (2013.01); G06F 30/20 (2020.01); G06F 2221/034 (2013.01)] | 18 Claims |

|
1. A threat model chaining method, comprising:
providing one or more databases, the one or more databases storing:
a plurality of threat model components, each threat model component defining one or more elements of systems, applications, or processes; and
a plurality of threat models, each threat model associated with at least one threat model component of the plurality of threat model components;
providing one or more interfaces, including a diagram interface, configured to be displayed on one or more end user computing devices communicatively coupled with the one or more databases;
configuring the diagram interface to display a relational diagram of one of a system, an application, or a process, using visual representations of at least one first threat model component, the relational diagram defining a first threat model based on the at least one first threat model component; and
configuring the diagram interface to, in response to receiving one or more first user inputs, add at least one second threat model component to the displayed relational diagram and thereby update the first threat model by adding at least one second threat model associated with the at least one second threat model component to the first threat model,
wherein the at least one second threat model component is not a part of the first threat model before being added,
wherein the at least one second threat model component comprises a predefined interrelated group of two or more elements of the system, the application, or the process, and
wherein the at least one second threat model component changes a composition of the system, the application, or the process.
|