2017-036-Adam Shostack talks about threat modeling, and how to do it properly
Common Information
Type | Value |
---|---|
UUID | d11388fe-d4dd-4da5-9c45-4f9cb561cc02 |
Fingerprint | 212c0f553e0d9dd9 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Oct. 29, 2017, 2:04 p.m. |
Added to db | Jan. 18, 2023, 7:44 p.m. |
Last updated | Nov. 17, 2024, 11:40 p.m. |
Headline | Brakeing Down Security Podcast Blog |
Title | 2017-036-Adam Shostack talks about threat modeling, and how to do it properly |
Detected Hints/Tags/Attributes | 17/1/35 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 21 | traffic.libsyn.com |
|
Details | Domain | 622 | en.wikipedia.org |
|
Details | Domain | 57 | www.owasp.org |
|
Details | Domain | 1 | octotrike.org |
|
Details | Domain | 50 | www.nist.gov |
|
Details | Domain | 397 | www.microsoft.com |
|
Details | Domain | 201 | msdn.microsoft.com |
|
Details | Domain | 18 | amzn.to |
|
Details | Domain | 1 | www.selfawareness.org.uk |
|
Details | File | 1 | 2017-036-adam_shostack-threat_modeling.mp3 |
|
Details | File | 1 | appseceu2012_pasta.pdf |
|
Details | File | 1 | lampson_rfi_response.pdf |
|
Details | File | 38 | details.aspx |
|
Details | File | 1 | hh204743.aspx |
|
Details | File | 1 | cc307404.aspx |
|
Details | File | 1 | cc307403.aspx |
|
Details | File | 1206 | index.php |
|
Details | File | 1 | robert-hurlbut-nymjcsc-learning-about-threat-modeling-10052017.pdf |
|
Details | Url | 1 | http://traffic.libsyn.com/brakeingsecurity/2017-036-adam_shostack-threat_modeling.mp3 |
|
Details | Url | 1 | https://en.wikipedia.org/wiki/stride_ |
|
Details | Url | 1 | https://en.wikipedia.org/wiki/dread_ |
|
Details | Url | 1 | https://www.owasp.org/images/a/aa/appseceu2012_pasta.pdf |
|
Details | Url | 1 | http://octotrike.org |
|
Details | Url | 1 | https://en.wikipedia.org/wiki/johari_window |
|
Details | Url | 1 | https://www.nist.gov/sites/default/files/documents/2016/09/16/s.lipner-b.lampson_rfi_response.pdf |
|
Details | Url | 1 | https://www.microsoft.com/en-us/download/details.aspx?id=20303 |
|
Details | Url | 14 | https://www.nist.gov/cyberframework |
|
Details | Url | 1 | https://msdn.microsoft.com/en-us/library/hh204743.aspx |
|
Details | Url | 1 | https://msdn.microsoft.com/en-us/library/windows/desktop/cc307404.aspx |
|
Details | Url | 1 | https://msdn.microsoft.com/en-us/library/windows/desktop/cc307403.aspx |
|
Details | Url | 1 | https://www.owasp.org/index.php/application_threat_modeling |
|
Details | Url | 1 | https://www.owasp.org/index.php/owasp_threat_dragon |
|
Details | Url | 1 | https://roberthurlbut.com/resources/2017/nymjcsc/robert-hurlbut-nymjcsc-learning-about-threat-modeling-10052017.pdf |
|
Details | Url | 1 | http://amzn.to/2z2cni1 |
|
Details | Url | 1 | http://www.selfawareness.org.uk/news/understanding-the-johari-window-model |