Главная
Study mode:
on
1
Introduction
2
Who is Tony
3
What is Threat Modeling
4
PASTA
5
Threat vs Attack
6
Blind Threat Model
7
PASTA Framework
8
Risk Formula
9
Probabilistic Bands
10
Other Artifacts
11
Case Study Consumer Electronics
12
Case Study Cloud Pets
13
Case Study Teddy Bear
14
Use Cases
15
Abuse Cases
16
Unauthenticated Requests
17
Generic Attributes
18
Mapping Use Cases
19
Scenario Threat Analysis
20
Stage 4 Threat Modeling
21
Stage 6 Attack Trees
22
Residual Risk Analysis
23
Health Care
24
Mobile Application
25
Technology Components
26
Data Flow Diagram
27
Threat Analysis
28
Three main differentiators
29
Private questions
30
PASTA examples
Description:
Explore risk-centric threat modeling using the PASTA methodology in this 46-minute conference talk from AppSec EU 2017. Gain insights into preemptive design and coding techniques aligned with application use cases and threat contexts. Examine three detailed case studies covering IoT, E-Commerce, and Mobile Applications. Learn how to harvest and correlate threat patterns, define preemptive controls, and incorporate countermeasures into overall design. Delve into topics such as data flow diagramming, threat analytics, and security architecture. Discover the PASTA framework, risk formulas, probabilistic bands, and other artifacts essential for effective threat modeling. Analyze specific scenarios including consumer electronics, cloud pets, and teddy bears, mapping use cases to potential abuse cases. Understand the process of scenario threat analysis, attack tree construction, and residual risk assessment across various industries including healthcare and mobile applications.

Threat Modeling with PASTA - Application Security Case Studies

OWASP Foundation
Add to list
NaN:NaN / NaN:NaN