Главная
Study mode:
on
1
Intro
2
Threat Modeling Overview • Depiction of a systems attack surface and how a set
3
Threat Modeling Syntax
4
Assets and Controls
5
Quantifying Threats
6
Threat Modeling Process
7
Considering Business Risks
8
Breaking Away From Super Secure Design
9
Modeling the System . The threat model builds from an initially created system model
10
Trust Boundaries
11
Threat Agents
12
When to Threat Model?
13
The Little Things Matter
14
Let's Illustrate
15
Gaming Platforms Game Consoles
16
Modeling all the Things
17
Re-Usable Components
18
Trusted on Busted
19
Program Considerations
Description:
Explore threat modeling in the gaming industry through this conference talk, focusing on client-side logic, proprietary network protocols, user account management, and playing on untrusted platforms. Gain insights into the threat modeling process, including system attack surface analysis, threat modeling syntax, asset and control identification, and threat quantification. Discover how to consider business risks, break away from overly secure designs, and create effective system models with trust boundaries. Learn about threat agents, timing of threat modeling, and the importance of small details. Examine gaming platforms, consoles, and reusable components, while understanding the challenges of trusted versus untrusted environments. Apply these concepts to enhance security and improve user experience in game development.

Threat Modeling for the Gaming Industry

NorthSec
Add to list