Completed
Threat Actions - STRIDE + LM
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Demystifying 5G Security through Threat Modeling
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What is 5G ?
- 3 Generations of Mobile Technologies
- 4 5G Features - Performance
- 5 56 Features - Technology Revolution
- 6 Supported by Network Slicing and Virtualization
- 7 5G Security - Radio Access Network
- 8 5G Security - Core Network - Service-based Architecture
- 9 5G Security - Trust Model
- 10 5G Security - Multi-Access Edge Computing (MEC)
- 11 5G Security - Key Elements
- 12 5G Security Challenges
- 13 The Threat Modeling Process
- 14 Threat Actors
- 15 Threat Actions - STRIDE + LM
- 16 Threats (Actors Performing Actions)
- 17 Threat Model for a Specific Use Case
- 18 Sample Threat Table for the Use Case
- 19 Sample Risk Assessment and Disposition
- 20 5G Threats - Major Mitigating Controls
- 21 Apply What You Have Learned Today
- 22 References