Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Threat Modeling for the Gaming Industry

NorthSec via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore threat modeling in the gaming industry through this conference talk, focusing on client-side logic, proprietary network protocols, user account management, and playing on untrusted platforms. Gain insights into the threat modeling process, including system attack surface analysis, threat modeling syntax, asset and control identification, and threat quantification. Discover how to consider business risks, break away from overly secure designs, and create effective system models with trust boundaries. Learn about threat agents, timing of threat modeling, and the importance of small details. Examine gaming platforms, consoles, and reusable components, while understanding the challenges of trusted versus untrusted environments. Apply these concepts to enhance security and improve user experience in game development.

Syllabus

Intro
Threat Modeling Overview • Depiction of a systems attack surface and how a set
Threat Modeling Syntax
Assets and Controls
Quantifying Threats
Threat Modeling Process
Considering Business Risks
Breaking Away From Super Secure Design
Modeling the System . The threat model builds from an initially created system model
Trust Boundaries
Threat Agents
When to Threat Model?
The Little Things Matter
Let's Illustrate
Gaming Platforms Game Consoles
Modeling all the Things
Re-Usable Components
Trusted on Busted
Program Considerations

Taught by

NorthSec

Reviews

Start your review of Threat Modeling for the Gaming Industry

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.