Главная
Study mode:
on
1
Introduction
2
Background
3
Threat Modeling Experience
4
What is Threat Modeling
5
Train Intelligence
6
Why do Threat Modeling
7
Lack of Communication
8
Communication
9
Tools
10
DFG Diagram
11
Not an architectural document
12
Flow diagram
13
Mobile app
14
Electron Wallet
15
Exchange
16
Blockchain Integration
17
Extended Set
18
Domain Real Life
19
Graph
20
Labels
21
Errors
22
Target Visuals
23
JSONRPC Vulnerability
24
Note
25
Security Control Checklist
26
Questions
27
Architecture
28
Attack Tree
29
Spy
30
Privacy
31
Balance
32
WebEx
33
Whiteboard
34
Plans UML
35
Parse
36
Conclusion
37
Modeling Panels
Description:
Explore the fundamentals of threat modeling in software development through this 49-minute conference talk from APPSEC Cali 2018. Delve into the essential components of effective threat modeling, including structuring potential attacks, identifying bad actors, and implementing countermeasures. Learn how to apply these concepts using a cryptocurrency ecosystem as a practical example. Gain insights from Jonathan Marcil, an Application Security Engineer at Twitch, as he shares his expertise in architecture analysis, code review, and security tool evaluation. Discover the importance of early security analysis in the development process and how threat modeling can improve communication within teams. Examine various tools and techniques, such as DFG diagrams, flow diagrams, and attack trees, to enhance your threat modeling skills. Benefit from Marcil's extensive experience in Information Technology and Security as you explore this crucial aspect of application security.

Threat Modeling Toolkit

OWASP Foundation
Add to list