paint-brush
K.I.S.S. on a Threat Model, Like it is Hot P.2by@bogomil
252 reads

K.I.S.S. on a Threat Model, Like it is Hot P.2

by Bogomil Shopov - Бого1mNovember 13th, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

In part one of this article, I started to look at the challenge of how to do threat modeling better as a development team. I recommend reading it first before continuing with this one. At this point, you should know your attackers, your assets and build a register of threats. This information should give you enough data to answer the second question of the threat modeling, "What could go wrong?" Then it's time to start digging into the third question - "What are we doing to do about it?"

Coin Mentioned

Mention Thumbnail
featured image - K.I.S.S. on a Threat Model, Like it is Hot P.2
Bogomil Shopov - Бого HackerNoon profile picture
Bogomil Shopov - Бого

Bogomil Shopov - Бого

@bogomil

Human. Artist. I care about free and open-source software, cybersecurity, ethical design, privacy, and technology.

About @bogomil
LEARN MORE ABOUT @BOGOMIL'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Bogomil Shopov - Бого HackerNoon profile picture
Bogomil Shopov - Бого@bogomil
Human. Artist. I care about free and open-source software, cybersecurity, ethical design, privacy, and technology.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Koyu
Runonflux