Threat modeling report

Part 1

 

Write 2 pages on each.

  • OSMR
  • MARCO
  • CORAS Risk Assessment Platform
  • ISO 17799 Risk Assessment Toolkit
  • Easy Threat Risk Assessment
  • ARMS
  • Minaccia
  • ThreatMind
  • A.S.T.A (Process for Attack Simulation and Threat Analysis)
  • Trike
  • ATASM
  • Lightweight/Rapid Threat Modeling
  • Threat Library/List Approach
  • Open Source Requirements Management Tool

 

 

Part 2

Download Microsoft Threat modeling (provided with this folder)

Then write to explain why do we need the Microsoft Threat modeling, how to use it

Give a complete example (2 application as distributed below)  ; your end results are the list and description  of risk found . Your report must conations the following items:

  • Why Do Threat Modeling?
  • When To Do Threat Modeling?
  • How To Do Threat Modeling?
  • How To Do Threat Modeling
  • Threat Modeling Scope?
  • Methodology?

 

 

 

 

 

Threat modeling privacy of social network

People threat modeling

Threat modeling with Waterfall approaches

Agile approaches

Threat modeling of a mobile device

Network threat modeling

Physical threat modeling

Data-Centric System Threat Modeling

Using Threat Modeling to Secure dataCenter

Surveillance Self Defense: Threat Modeling

Threat modeling on social networking

Human threat modeling

Online thefts threads modeling

Privacy threat analysis and modeling

Open Source Threat Modeling

Privacy Threat Modeling for  Biobank

Threat risk modeling for web services

Email threat modeling

Management threat models

Technical threat modeling

Threat modeling for Code Signing   NIST Cybersecurity White Paper

Threat modeling Domain Name System-Based Electronic Mail Security    SP 1800-6

Threat modeling Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) NIST Special Publication 800-187

Risk Assessment and Threat Modeling

Threat modeling for cloud computing

Threat modeling for web service

Threat modeling for API

 

 

 

 

 

 

 

Your report should be 20 Page (single space Font 12 Times New Roman)

 

The report are distributed according to the following list

ID Application 1
2842318 Threat modeling with Fog Computing

NIST Special Publication 800-191

2831577 Threat modeling of a mobile device
2832053 Network threat modeling
2832431 Physical threat modeling
2820842 Data-Centric System Threat Modeling
2820818 Using Threat Modeling to Secure dataCenter
2832388 Surveillance Self Defense: Threat Modeling
2820837 Threat modeling on social networking
2843438 mangements  threat modeling
2827927 Online thefts threads modeling
2843377 Privacy threat analysis and modeling
2816453 Open Source Threat Modeling
2841580 Privacy Threat Modeling for  Biobank
2837383
2816462 Threat risk modeling for web services
2832372 Email threat modeling
2836100 Management threat models
2831931 Technical threat modeling
2842950 Threat modeling for Code Signing   NIST Cybersecurity White Paper
2842959 Threat modeling Domain Name System-Based Electronic Mail Security    SP 1800-6
2842959 Threat modeling Information Technology Laboratory (ITL)

at the National Institute of Standards and Technology (NIST) NIST Special Publication 800-187

2804919 Risk Assessment and Threat Modeling
2831602 Threat modeling for cloud computing
2838428 Threat modeling for web service
2837174 Threat modeling for API

 

 

ID Application 2
2842318 Threat modeling privacy of social network
2831577 People threat modeling
2832053 Threat modeling with Waterfall approaches
2832431 Agile approaches
2820842 Threat modeling with Fog Computing  NIST Special Publication 800-191
2820818 Threat modeling of a mobile device
2832388 Network threat modeling
2820837 Physical threat modeling
2843438 Data-Centric System Threat Modeling
2827927 Using Threat Modeling to Secure dataCenter
2843377 Surveillance Self Defense: Threat Modeling
2816453 Threat modeling on social networking
2841580 Human threat modeling
2837383 Online thefts threads modeling
2816462 Privacy threat analysis and modeling
2832372 Open Source Threat Modeling
2836100 Privacy Threat Modeling for  Biobank
2831931
2842950 Threat risk modeling for web services
2842959 Email threat modeling
2842959 Management threat models
2804919 Technical threat modeling
2831602 Threat modeling for Code Signing   NIST Cybersecurity White Paper
2838428 Threat modeling Domain Name System-Based Electronic Mail Security    SP 1800-6
2837174 Threat modeling Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) NIST Special Publication 800-187