Threat Modeling for Secure Software Design

Threat Modeling for Secure Software Design

via YouTube Direct link

Threat Modeling Process

13 of 29

13 of 29

Threat Modeling Process

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Threat Modeling for Secure Software Design

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Robert Hurlbut
  2. 2 Secure Software Design
  3. 3 What is threat modeling?
  4. 4 Threat modeling helps ...
  5. 5 Where does threat modeling fit?
  6. 6 Definitions
  7. 7 Typical Threat Modeling Session
  8. 8 Simple Tools
  9. 9 Simple Threat Model - One Page
  10. 10 Threat Model Sample Worksheet
  11. 11 Review Security Principles
  12. 12 IEEE Computer Society's Center for Secure Design Take a look at
  13. 13 Threat Modeling Process
  14. 14 Draw your picture
  15. 15 Understand the system
  16. 16 STRIDE Framework – Data Flow Threat
  17. 17 OWASP Cornucopia
  18. 18 Identify Threats - Functional
  19. 19 Identity Threats - Ask Questions
  20. 20 One of the best questions ...
  21. 21 Scenario - Configuration Management
  22. 22 Determine mitigations and risks
  23. 23 Risk Rating - Ease of Exploitation
  24. 24 Risk Rating - Business Impact
  25. 25 Example - Medium Risk Threat
  26. 26 Follow through
  27. 27 Your challenge
  28. 28 Resources - Tools
  29. 29 Questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.