Threat modeling report

Part 1

 

Write 2 pages on each.

  • OSMR
  • MARCO
  • CORAS Risk Assessment Platform
  • ISO 17799 Risk Assessment Toolkit
  • Easy Threat Risk Assessment
  • ARMS
  • Minaccia
  • ThreatMind
  • A.S.T.A (Process for Attack Simulation and Threat Analysis)
  • Trike
  • ATASM
  • Lightweight/Rapid Threat Modeling
  • Threat Library/List Approach
  • Open Source Requirements Management Tool

 

 

Part 2

Download Microsoft Threat modeling (provided with this folder)

Then write to explain why do we need the Microsoft Threat modeling, how to use it

Give a complete example (2 application as distributed below)  ; your end results are the list and description  of risk found . Your report must conations the following items:

  • Why Do Threat Modeling?
  • When To Do Threat Modeling?
  • How To Do Threat Modeling?
  • How To Do Threat Modeling
  • Threat Modeling Scope?
  • Methodology?

 

 

 

 

 

Threat modeling privacy of social network

People threat modeling

Threat modeling with Waterfall approaches

Agile approaches

Threat modeling of a mobile device

Network threat modeling

Physical threat modeling

Data-Centric System Threat Modeling

Using Threat Modeling to Secure dataCenter

Surveillance Self Defense: Threat Modeling

Threat modeling on social networking

Human threat modeling

Online thefts threads modeling

Privacy threat analysis and modeling

Open Source Threat Modeling

Privacy Threat Modeling for  Biobank

Threat risk modeling for web services

Email threat modeling

Management threat models

Technical threat modeling

Threat modeling for Code Signing   NIST Cybersecurity White Paper

Threat modeling Domain Name System-Based Electronic Mail Security    SP 1800-6

Threat modeling Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) NIST Special Publication 800-187

Risk Assessment and Threat Modeling

Threat modeling for cloud computing

Threat modeling for web service

Threat modeling for API

 

 

 

 

 

 

 

Your report should be 20 Page (single space Font 12 Times New Roman)

 

The report are distributed according to the following list

IDApplication 1
2842318Threat modeling with Fog Computing

NIST Special Publication 800-191

2831577Threat modeling of a mobile device
2832053Network threat modeling
2832431Physical threat modeling
2820842Data-Centric System Threat Modeling
2820818Using Threat Modeling to Secure dataCenter
2832388Surveillance Self Defense: Threat Modeling
2820837Threat modeling on social networking
2843438mangements  threat modeling
2827927Online thefts threads modeling
2843377Privacy threat analysis and modeling
2816453Open Source Threat Modeling
2841580Privacy Threat Modeling for  Biobank
2837383
2816462Threat risk modeling for web services
2832372Email threat modeling
2836100Management threat models
2831931Technical threat modeling
2842950Threat modeling for Code Signing   NIST Cybersecurity White Paper
2842959Threat modeling Domain Name System-Based Electronic Mail Security    SP 1800-6
2842959Threat modeling Information Technology Laboratory (ITL)

at the National Institute of Standards and Technology (NIST) NIST Special Publication 800-187

2804919Risk Assessment and Threat Modeling
2831602Threat modeling for cloud computing
2838428Threat modeling for web service
2837174Threat modeling for API

 

 

IDApplication 2
2842318Threat modeling privacy of social network
2831577People threat modeling
2832053Threat modeling with Waterfall approaches
2832431Agile approaches
2820842Threat modeling with Fog Computing  NIST Special Publication 800-191
2820818Threat modeling of a mobile device
2832388Network threat modeling
2820837Physical threat modeling
2843438Data-Centric System Threat Modeling
2827927Using Threat Modeling to Secure dataCenter
2843377Surveillance Self Defense: Threat Modeling
2816453Threat modeling on social networking
2841580Human threat modeling
2837383Online thefts threads modeling
2816462Privacy threat analysis and modeling
2832372Open Source Threat Modeling
2836100Privacy Threat Modeling for  Biobank
2831931
2842950Threat risk modeling for web services
2842959Email threat modeling
2842959Management threat models
2804919Technical threat modeling
2831602Threat modeling for Code Signing   NIST Cybersecurity White Paper
2838428Threat modeling Domain Name System-Based Electronic Mail Security    SP 1800-6
2837174Threat modeling Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) NIST Special Publication 800-187

 

 

Last Updated on August 15, 2019

Don`t copy text!
Scroll to Top