Part 1
Write 2 pages on each.
- OSMR
- MARCO
- CORAS Risk Assessment Platform
- ISO 17799 Risk Assessment Toolkit
- Easy Threat Risk Assessment
- ARMS
- Minaccia
- ThreatMind
- A.S.T.A (Process for Attack Simulation and Threat Analysis)
- Trike
- ATASM
- Lightweight/Rapid Threat Modeling
- Threat Library/List Approach
- Open Source Requirements Management Tool
Part 2
Download Microsoft Threat modeling (provided with this folder)
Then write to explain why do we need the Microsoft Threat modeling, how to use it
Give a complete example (2 application as distributed below) ; your end results are the list and description of risk found . Your report must conations the following items:
- Why Do Threat Modeling?
- When To Do Threat Modeling?
- How To Do Threat Modeling?
- How To Do Threat Modeling
- Threat Modeling Scope?
- Methodology?
Threat modeling privacy of social network
People threat modeling
Threat modeling with Waterfall approaches
Agile approaches
Threat modeling of a mobile device
Network threat modeling
Physical threat modeling
Data-Centric System Threat Modeling
Using Threat Modeling to Secure dataCenter
Surveillance Self Defense: Threat Modeling
Threat modeling on social networking
Human threat modeling
Online thefts threads modeling
Privacy threat analysis and modeling
Open Source Threat Modeling
Privacy Threat Modeling for Biobank
Threat risk modeling for web services
Email threat modeling
Management threat models
Technical threat modeling
Threat modeling for Code Signing NIST Cybersecurity White Paper
Threat modeling Domain Name System-Based Electronic Mail Security SP 1800-6
Threat modeling Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) NIST Special Publication 800-187
Risk Assessment and Threat Modeling
Threat modeling for cloud computing
Threat modeling for web service
Threat modeling for API
Your report should be 20 Page (single space Font 12 Times New Roman)
The report are distributed according to the following list
ID | Application 1 |
2842318 | Threat modeling with Fog Computing NIST Special Publication 800-191 |
2831577 | Threat modeling of a mobile device |
2832053 | Network threat modeling |
2832431 | Physical threat modeling |
2820842 | Data-Centric System Threat Modeling |
2820818 | Using Threat Modeling to Secure dataCenter |
2832388 | Surveillance Self Defense: Threat Modeling |
2820837 | Threat modeling on social networking |
2843438 | mangements threat modeling |
2827927 | Online thefts threads modeling |
2843377 | Privacy threat analysis and modeling |
2816453 | Open Source Threat Modeling |
2841580 | Privacy Threat Modeling for Biobank |
2837383 | |
2816462 | Threat risk modeling for web services |
2832372 | Email threat modeling |
2836100 | Management threat models |
2831931 | Technical threat modeling |
2842950 | Threat modeling for Code Signing NIST Cybersecurity White Paper |
2842959 | Threat modeling Domain Name System-Based Electronic Mail Security SP 1800-6 |
2842959 | Threat modeling Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) NIST Special Publication 800-187 |
2804919 | Risk Assessment and Threat Modeling |
2831602 | Threat modeling for cloud computing |
2838428 | Threat modeling for web service |
2837174 | Threat modeling for API |
ID | Application 2 |
2842318 | Threat modeling privacy of social network |
2831577 | People threat modeling |
2832053 | Threat modeling with Waterfall approaches |
2832431 | Agile approaches |
2820842 | Threat modeling with Fog Computing NIST Special Publication 800-191 |
2820818 | Threat modeling of a mobile device |
2832388 | Network threat modeling |
2820837 | Physical threat modeling |
2843438 | Data-Centric System Threat Modeling |
2827927 | Using Threat Modeling to Secure dataCenter |
2843377 | Surveillance Self Defense: Threat Modeling |
2816453 | Threat modeling on social networking |
2841580 | Human threat modeling |
2837383 | Online thefts threads modeling |
2816462 | Privacy threat analysis and modeling |
2832372 | Open Source Threat Modeling |
2836100 | Privacy Threat Modeling for Biobank |
2831931 | |
2842950 | Threat risk modeling for web services |
2842959 | Email threat modeling |
2842959 | Management threat models |
2804919 | Technical threat modeling |
2831602 | Threat modeling for Code Signing NIST Cybersecurity White Paper |
2838428 | Threat modeling Domain Name System-Based Electronic Mail Security SP 1800-6 |
2837174 | Threat modeling Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) NIST Special Publication 800-187 |