Threat Model Diagram Example: Guerrilla Threat Modelling


Using the Threat Model diagram we can see that there are number of threats between the beginning of a customer transaction to the end of the tranaction process. We can then find solutions to eliminate these risks.

Use this Threat Model Diagram template to create your own diagram. Simply Click Use this Template to edit, or click Create Blank to draw from scratch.

What is a Threat Model?

A Threat Model is best describe to analyize the security of an application. It is used to identify, quantify and explore the security risks in an application.

How to draw a Threat Model Diagram?

Explore the vulnerability and develop ways to prevent it.

  1. Create a Threat Model Diagram.
  2. Choose a shape then drag and drop it into the drawing canvas
  3. Once your diagram is complete, you can save it (File > Save as) to our cloud repository for future access. You can also export your work into image (JPG, PNG, PDF, SVG, etc) and share it with your co-workers.

Keen to try VP Online?

No limitations, no obligations, no cancellation fees.

Start a Free Trial

We use cookies to offer you a better experience. By visiting our website, you agree to the use of cookies as described in our Cookie Policy.