YoVDO

Threat Modeling with PASTA - Application Security Case Studies

Offered By: OWASP Foundation via YouTube

Tags

Threat Modeling Courses Risk Assessment Courses Application Security Courses IoT security Courses Mobile Application Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore risk-centric threat modeling using the PASTA methodology in this 46-minute conference talk from AppSec EU 2017. Gain insights into preemptive design and coding techniques aligned with application use cases and threat contexts. Examine three detailed case studies covering IoT, E-Commerce, and Mobile Applications. Learn how to harvest and correlate threat patterns, define preemptive controls, and incorporate countermeasures into overall design. Delve into topics such as data flow diagramming, threat analytics, and security architecture. Discover the PASTA framework, risk formulas, probabilistic bands, and other artifacts essential for effective threat modeling. Analyze specific scenarios including consumer electronics, cloud pets, and teddy bears, mapping use cases to potential abuse cases. Understand the process of scenario threat analysis, attack tree construction, and residual risk assessment across various industries including healthcare and mobile applications.

Syllabus

Introduction
Who is Tony
What is Threat Modeling
PASTA
Threat vs Attack
Blind Threat Model
PASTA Framework
Risk Formula
Probabilistic Bands
Other Artifacts
Case Study Consumer Electronics
Case Study Cloud Pets
Case Study Teddy Bear
Use Cases
Abuse Cases
Unauthenticated Requests
Generic Attributes
Mapping Use Cases
Scenario Threat Analysis
Stage 4 Threat Modeling
Stage 6 Attack Trees
Residual Risk Analysis
Health Care
Mobile Application
Technology Components
Data Flow Diagram
Threat Analysis
Three main differentiators
Private questions
PASTA examples


Taught by

OWASP Foundation

Related Courses

A developer's guide to the Internet of Things (IoT)
IBM via Coursera
Enterprise and Infrastructure Security
New York University (NYU) via Coursera
Getting Started with the Internet of Things (IoT)
Microsoft via edX
AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
Components And Applications Of Internet Of Things
Indian Institute of Technology Patna via Swayam