Posts

Showing posts from January, 2019

A Review of Adam Shostack’s “Threat Modeling”

Adam Shostack lives and works in Seattle, Washington, as the President of Shostack & Associates. He has more than a decade of experience in information security, much of which he spent at Microsoft, and he’s passionate about his field. He’s the author of Threat Modeling: Designing for Security (Wiley, 2014), which continues to receive excellent reader reviews years after launch. One such review of Adam Shostack’s Threat Modeling: Designing for Security is highlighted below: ·          “Adam is the expert of threat modeling and presented a talk at Blackhat 2018 covering the most current threats and they are easily folding into the existing threat model. The book is easy to read and understand. Highly recommend for every security professional.” Click here to buy the book on Amazon. Want to keep reading about Adam Shostack’s career as a cybersecurity game changer? If so, head to adam.shostack.org for complete information on his professional accomplishments, publis

Learning Threat Modeling for Security Professionals, Course by: Adam Shostack

Course by:  Adam Shostack Overview: In the twenty-first century, no one doubts the importance of cybersecurity. Threat modeling is where it starts. Threat modeling is a framework for thinking about what can go wrong, and the foundation for everything a security professional does. This training course provides an overview of the traditional four-question framework for (1) defining what you’re working on, (2) discovering what can go wrong, (3) deciding what to do about it, and (4) ensuring you’ve done the right things in the right ways for the systems you’re delivering. Instructor Adam Shostack also reviews the STRIDE model for identifying six types of threats: spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege. Using a simple case study—a billing system for a media server that serves ads—Adam shows how to apply the principles and find security and privacy problems so the developer can include appropriate configuratio