The separate Threat Modeling video has more detail of the actual process of using STRIDE to identify threats, this video provides a walk through and demo.
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at z.cliffe.schreuders.org/.
The slides themselves are creative commons licensed CC-BY-SA, and images used are licensed as individually attributed.
コメント