Completed
Elements of a Threat Model
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Simplifying Threat Modeling
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Today's Threat Modeling Theme
- 3 What is a Threat?
- 4 Threat Example - Mobile Architecture
- 5 Anatomy of an Attack
- 6 Threat Traceability Matrix
- 7 Elements of a Threat Model
- 8 Simplified Threat Modeling Framework
- 9 Diagram Software Architecture
- 10 Enumerate Attack Surface(s)
- 11 Each User Class Becomes a Threat
- 12 Malicious Intent Creates New Threat
- 13 Visualize Normal Users as Threats
- 14 Re-consider Attack Surface(s)
- 15 Capture 'Who', 'Where', and 'What'
- 16 Illuminate Assets
- 17 Illuminate Trust Boundaries
- 18 Postulate Attacks Against Assets
- 19 Evaluate Impact
- 20 Mitigate
- 21 7+1 Threat Modeling Steps
- 22 Acting on Threat Modeling Results
- 23 Simplifying Threat Modeling