Skip to the content.

~

~/Security

~/Security/Appsec



Threat Modeling

Written while completing the Threat Modeling Skills course by Adam Shostack, on LinkedIn Learning

Certificate of Completion

Four-Question Framework

  1. What are we working on?(Assess Scope)
  2. What can go wrong?(Identify what can go wrong)
  3. What are we going to do about it?(Identify countermeasures/perform risk management)
  4. Did we do a good job?(Assess Work)

Steps

Decompose the Application

Determining and Ranking Threats using STRIDE

threat categorization

help identify threats from the attacker and

risk=P(threat)*cost

Create a threat tree diagram

Risk Management

once the possible impact is identified, the associated risks can be-