Completed
Identify Threats - Functional
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Threat Modeling for Secure Software Design
Automatically move to the next video in the Classroom when playback concludes
- 1 Robert Hurlbut
- 2 Secure Software Design
- 3 What is threat modeling?
- 4 Threat modeling helps ...
- 5 Where does threat modeling fit?
- 6 Definitions
- 7 Typical Threat Modeling Session
- 8 Simple Tools
- 9 Simple Threat Model - One Page
- 10 Threat Model Sample Worksheet
- 11 Review Security Principles
- 12 IEEE Computer Society's Center for Secure Design Take a look at
- 13 Threat Modeling Process
- 14 Draw your picture
- 15 Understand the system
- 16 STRIDE Framework – Data Flow Threat
- 17 OWASP Cornucopia
- 18 Identify Threats - Functional
- 19 Identity Threats - Ask Questions
- 20 One of the best questions ...
- 21 Scenario - Configuration Management
- 22 Determine mitigations and risks
- 23 Risk Rating - Ease of Exploitation
- 24 Risk Rating - Business Impact
- 25 Example - Medium Risk Threat
- 26 Follow through
- 27 Your challenge
- 28 Resources - Tools
- 29 Questions?