Threat Modeling for the Gaming Industry

Threat Modeling for the Gaming Industry

NorthSec via YouTube Direct link

Trust Boundaries

10 of 19

10 of 19

Trust Boundaries

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Threat Modeling for the Gaming Industry

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Threat Modeling Overview • Depiction of a systems attack surface and how a set
  3. 3 Threat Modeling Syntax
  4. 4 Assets and Controls
  5. 5 Quantifying Threats
  6. 6 Threat Modeling Process
  7. 7 Considering Business Risks
  8. 8 Breaking Away From Super Secure Design
  9. 9 Modeling the System . The threat model builds from an initially created system model
  10. 10 Trust Boundaries
  11. 11 Threat Agents
  12. 12 When to Threat Model?
  13. 13 The Little Things Matter
  14. 14 Let's Illustrate
  15. 15 Gaming Platforms Game Consoles
  16. 16 Modeling all the Things
  17. 17 Re-Usable Components
  18. 18 Trusted on Busted
  19. 19 Program Considerations

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.