Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

A Convenient Guide to Starting You on Threat Modeling
A Convenient Guide to Starting You on Threat Modeling
A Convenient Guide to Starting You on Threat Modeling
Ebook31 pages35 minutes

A Convenient Guide to Starting You on Threat Modeling

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Hello,
Threat modeling for software products is a process of analyzing system representations to highlight concerns about security, privacy, and ethics characteristics.

There are many ways to do that these days, including automated tools and approaches such as Thread Modeling "as code."

 

Using a tool before knowing the basics and doing a few threat models manually could create an insecure product because you count on something else to do the work without knowing the specifics.

 

My e-book aims to explain the basics, starting from how we are wired as humans, how we act and react to threats, and how you could apply this to the software threat modeling process.

LanguageEnglish
Release dateDec 7, 2022
ISBN9798215313626
A Convenient Guide to Starting You on Threat Modeling
Author

Bogomil Shopov

I am Program Management Professional. I apply Lean-Agile knowledge and tools to optimize the flow of value across complex systems through system thinking. I care about Privacy, Ethical design, Freedom, and Cybersecurity in many aspects.

Related to A Convenient Guide to Starting You on Threat Modeling

Related ebooks

Internet & Web For You

View More

Related articles

Reviews for A Convenient Guide to Starting You on Threat Modeling

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    A Convenient Guide to Starting You on Threat Modeling - Bogomil Shopov

    Welcome

    How is this e-book different from the others on the market?

    First, thanks for choosing my little e-book from the vast sea of similar ones. I appreciate it!

    I created a learning path and resources and trained more than 200 people using the approach described in this book and helped them start their way of making securer software. The feedback was impressive, and the results were visible.

    The book includes some internet resources, but the rest of the passion, examples, ideas, and process are entirely mine. You wouldn't find this knowledge in any other place.

    ..

    This small e-book aims to explain the basics, starting from how we are wired as humans, how we act and react to threats, and how you could apply this to the threat modeling process fixing the gaps and ensuring that we don’t leave out code unattended.

    In the end, you will find out how to get the template you could use with your teams for free.

    Happy reading!

    Gaps

    Doing threat modeling is one of the main requirements for almost any Agile organization.

    While analyzing the Software Development Life Cycle in a company I worked for, I realized a few dangerous gaps in our threat modeling process. I also talked with my network of professionals in other companies

    Enjoying the preview?
    Page 1 of 1