Threat Modeling with PASTA - Application Security Case Studies

Threat Modeling with PASTA - Application Security Case Studies

OWASP Foundation via YouTube Direct link

Data Flow Diagram

26 of 30

26 of 30

Data Flow Diagram

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Threat Modeling with PASTA - Application Security Case Studies

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Who is Tony
  3. 3 What is Threat Modeling
  4. 4 PASTA
  5. 5 Threat vs Attack
  6. 6 Blind Threat Model
  7. 7 PASTA Framework
  8. 8 Risk Formula
  9. 9 Probabilistic Bands
  10. 10 Other Artifacts
  11. 11 Case Study Consumer Electronics
  12. 12 Case Study Cloud Pets
  13. 13 Case Study Teddy Bear
  14. 14 Use Cases
  15. 15 Abuse Cases
  16. 16 Unauthenticated Requests
  17. 17 Generic Attributes
  18. 18 Mapping Use Cases
  19. 19 Scenario Threat Analysis
  20. 20 Stage 4 Threat Modeling
  21. 21 Stage 6 Attack Trees
  22. 22 Residual Risk Analysis
  23. 23 Health Care
  24. 24 Mobile Application
  25. 25 Technology Components
  26. 26 Data Flow Diagram
  27. 27 Threat Analysis
  28. 28 Three main differentiators
  29. 29 Private questions
  30. 30 PASTA examples

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.