making threat modeling so easy

Post on 22-Jan-2018

481 Views

Category:

Software

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

††Spoofing, Tampering, Repudiation, Information Disclosure,Denial of Service, Elevation of Priv

† Data Flow Diagrams

http://caniuse.com/#search=hsts

https://developer.mozilla.org/en-US/docs/web/Security/HTTP_strict_transport_security

https://www.nartac.com/Products/IISCrypto/Default.aspx

http://www.microsoft.com/security/data/

S

STRIDE

STRIDE

TI TI

TI

TI

TI

TI

TI

TI

S

STRIDE

STRIDE

TI TI

TI

TI

TI

TI

TI

TI

THIS IS YOUR

THREAT MODEL!

top related