Главная
Study mode:
on
1
Introduction
2
Show me the money
3
Disclaimer
4
Expectations
5
Participatory
6
Design problem
7
Requirements
8
Mindshare
9
Architecture
10
Threat Modeling
11
Secure Software
12
Security Architecture
13
One hundred percent certainty
14
Context
15
Whats already in place
16
Data sensitivity
17
Top secret
18
No book of answers
19
Architectures
20
Architecture Cold Call
21
Application Server
22
Browser Protection
23
Configuration
24
App
25
Targets
26
Employee Net
27
Message Flow
28
Organization Purpose
29
Access
30
The Architecture
31
Ecommerce
32
Extranet
33
Process
34
Threat Matrix
35
Systems Objectives
36
Risk
37
Business Intelligence
38
Input Validation
39
Identity Services
Description:
Dive into a participatory conference talk from AppSec California 2016 that demystifies threat modeling. Explore the essential aspects of security assessment in system development, including risk evaluation, architectural decomposition, and appropriate architectural views. Engage with Distinguished Engineer Brook Schoenfield as he unravels the complexities of threat modeling, transforming it from a "black art" into an accessible practice. Gain insights into secure software development, security architecture, and the importance of context in threat assessment. Learn about various architectural components, message flows, and threat matrices while understanding the significance of business intelligence and identity services in the process. Discover how to approach input validation and configuration in the context of threat modeling for e-commerce and extranet systems.

Unlocking Threat Modeling - Participatory Session on Security Architecture Assessment

OWASP Foundation
Add to list
0:00 / 0:00