Главная
Study mode:
on
1
Intro
2
Today's Threat Modeling Theme
3
What is a Threat?
4
Threat Example - Mobile Architecture
5
Anatomy of an Attack
6
Threat Traceability Matrix
7
Elements of a Threat Model
8
Simplified Threat Modeling Framework
9
Diagram Software Architecture
10
Enumerate Attack Surface(s)
11
Each User Class Becomes a Threat
12
Malicious Intent Creates New Threat
13
Visualize Normal Users as Threats
14
Re-consider Attack Surface(s)
15
Capture 'Who', 'Where', and 'What'
16
Illuminate Assets
17
Illuminate Trust Boundaries
18
Postulate Attacks Against Assets
19
Evaluate Impact
20
Mitigate
21
7+1 Threat Modeling Steps
22
Acting on Threat Modeling Results
23
Simplifying Threat Modeling
Description:
Explore a simplified approach to threat modeling in this 44-minute conference talk from LASCON 2012. Learn about the anatomy of an attack, threat traceability matrix, and elements of a threat model. Discover a streamlined framework for threat modeling, including steps to diagram software architecture, enumerate attack surfaces, and visualize users as potential threats. Gain insights on illuminating assets and trust boundaries, postulating attacks against assets, evaluating impact, and implementing mitigation strategies. Understand how to act on threat modeling results and simplify the overall process to enhance your cybersecurity practices.

Simplifying Threat Modeling

LASCON
Add to list
0:00 / 0:00