K.I.S.S. on a Threat Model, Like it is Hot P.2by@bogomil

K.I.S.S. on a Threat Model, Like it is Hot P.2

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

In part one of this article, I started to look at the challenge of how to do threat modeling better as a development team. I recommend reading it first before continuing with this one. At this point, you should know your attackers, your assets and build a register of threats. This information should give you enough data to answer the second question of the threat modeling, "What could go wrong?" Then it's time to start digging into the third question - "What are we doing to do about it?"

Coin Mentioned

Mention Thumbnail
featured image - K.I.S.S. on a Threat Model, Like it is Hot P.2
Bogomil Shopov - Бого HackerNoon profile picture

@bogomil

Bogomil Shopov - Бого


Receive Stories from @bogomil

react to story with heart
Bogomil Shopov - Бого HackerNoon profile picture
by Bogomil Shopov - Бого @bogomil.I care about privacy, ethical design, cybersecurity, and freedom in many aspects.
Visit my blog!

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa