Главная
Study mode:
on
1
Introduction
2
What is threat modeling
3
Definitions
4
Gather Documentation
5
Data Flow Diagram
6
Identifying Threats
7
Stride
8
Elevation of Privilege
9
Addressing the Threats
10
Validating
11
Challenge
12
Threat Modeling vs Risk Assessment
13
Threat vs Vulnerability
Description:
Explore the fundamentals of threat modeling in this 49-minute conference talk from BSides Boston 2015. Delve into key concepts including threat definitions, data flow diagrams, and the STRIDE model. Learn how to gather documentation, identify threats, address vulnerabilities, and validate your approach. Understand the differences between threat modeling and risk assessment, and gain insights into elevation of privilege concerns. Discover whether threat modeling is the right approach for your security needs and how to overcome common challenges in implementation.

Is Threat Modeling for Me

Add to list