K.I.S.S. on a Threat Model, Like it is Hot P.2by@bogomil

K.I.S.S. on a Threat Model, Like it is Hot P.2

tldt arrow
Read on Terminal Reader

Too Long; Didn't Read

In part one of this article, I started to look at the challenge of how to do threat modeling better as a development team. I recommend reading it first before continuing with this one. At this point, you should know your attackers, your assets and build a register of threats. This information should give you enough data to answer the second question of the threat modeling, "What could go wrong?" Then it's time to start digging into the third question - "What are we doing to do about it?"

Coin Mentioned

Mention Thumbnail
featured image - K.I.S.S. on a Threat Model, Like it is Hot P.2
Bogomil "Bogo" Shopov HackerNoon profile picture

@bogomil

Bogomil "Bogo" Shopov

About @bogomil
LEARN MORE ABOUT @BOGOMIL'S EXPERTISE AND PLACE ON THE INTERNET.
react to story with heart
Bogomil "Bogo" Shopov HackerNoon profile picture
by Bogomil "Bogo" Shopov @bogomil.I care about privacy, ethical design, and freedom in many aspects. Currently in Prague, Czechia!
Visit my personal hub!

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa