2017-036-Adam Shostack talks about threat modeling, and how to do it properly
Common Information
Type Value
UUID d11388fe-d4dd-4da5-9c45-4f9cb561cc02
Fingerprint 212c0f553e0d9dd9
Analysis status DONE
Considered CTI value 0
Text language
Published Oct. 29, 2017, 2:04 p.m.
Added to db Jan. 18, 2023, 7:44 p.m.
Last updated Nov. 17, 2024, 11:40 p.m.
Headline Brakeing Down Security Podcast Blog
Title 2017-036-Adam Shostack talks about threat modeling, and how to do it properly
Detected Hints/Tags/Attributes 17/1/35
Attributes
Details Type #Events CTI Value
Details Domain 21
traffic.libsyn.com
Details Domain 622
en.wikipedia.org
Details Domain 57
www.owasp.org
Details Domain 1
octotrike.org
Details Domain 50
www.nist.gov
Details Domain 397
www.microsoft.com
Details Domain 201
msdn.microsoft.com
Details Domain 18
amzn.to
Details Domain 1
www.selfawareness.org.uk
Details File 1
2017-036-adam_shostack-threat_modeling.mp3
Details File 1
appseceu2012_pasta.pdf
Details File 1
lampson_rfi_response.pdf
Details File 38
details.aspx
Details File 1
hh204743.aspx
Details File 1
cc307404.aspx
Details File 1
cc307403.aspx
Details File 1206
index.php
Details File 1
robert-hurlbut-nymjcsc-learning-about-threat-modeling-10052017.pdf
Details Url 1
http://traffic.libsyn.com/brakeingsecurity/2017-036-adam_shostack-threat_modeling.mp3
Details Url 1
https://en.wikipedia.org/wiki/stride_
Details Url 1
https://en.wikipedia.org/wiki/dread_
Details Url 1
https://www.owasp.org/images/a/aa/appseceu2012_pasta.pdf
Details Url 1
http://octotrike.org
Details Url 1
https://en.wikipedia.org/wiki/johari_window
Details Url 1
https://www.nist.gov/sites/default/files/documents/2016/09/16/s.lipner-b.lampson_rfi_response.pdf
Details Url 1
https://www.microsoft.com/en-us/download/details.aspx?id=20303
Details Url 14
https://www.nist.gov/cyberframework
Details Url 1
https://msdn.microsoft.com/en-us/library/hh204743.aspx
Details Url 1
https://msdn.microsoft.com/en-us/library/windows/desktop/cc307404.aspx
Details Url 1
https://msdn.microsoft.com/en-us/library/windows/desktop/cc307403.aspx
Details Url 1
https://www.owasp.org/index.php/application_threat_modeling
Details Url 1
https://www.owasp.org/index.php/owasp_threat_dragon
Details Url 1
https://roberthurlbut.com/resources/2017/nymjcsc/robert-hurlbut-nymjcsc-learning-about-threat-modeling-10052017.pdf
Details Url 1
http://amzn.to/2z2cni1
Details Url 1
http://www.selfawareness.org.uk/news/understanding-the-johari-window-model