YoVDO

Threat Modeling Made Interactive - Using Poirot for Dynamic Security Analysis

Offered By: OWASP Foundation via YouTube

Tags

Threat Modeling Courses Software Design Courses Application Security Courses Web Application Security Courses System Security Courses Security Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an interactive approach to threat modeling in this conference talk from AppSecUSA 2014. Learn how to identify potential security threats early in the development process and build effective mitigations into your system. Discover Poirot, a tool designed to assist developers in modeling and analyzing system security during the design phase. Understand how Poirot allows you to specify your system and desired security policies, perform automatic analysis to generate potential attacks, and interactively modify the system model to assess the impact of changes. See demonstrations of Poirot applied to web applications, and gain insights into its strengths and limitations. The talk covers the importance of threat modeling, challenges in existing techniques, and how Poirot's dynamic approach and built-in threat database can enhance the modeling process. Delve into topics such as security policy verification, impact assessment of design decisions, and the use of software verification for exhaustive analysis.

Syllabus

Introduction
About me
What is threat modeling
Why build threat models
Benefits of threat models
What makes modeling hard
Portal
Portal Demo
App Demo
Model Overview
Scenarios
Analysis
Key Ideas
Limitations
Tools


Taught by

OWASP Foundation

Related Courses

Enterprise System Management and Security
University of Colorado System via Coursera
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
PHP: Complete Login and Registration System with PHP & MYSQL
Udemy
Learn Ethical Hacking From Scratch 2024
Udemy
Serie Windows Server Update Services (WSUS)
Udemy