threat-modelling
security
models

First Steps in Security - Threat Modeling

  • Locked

A key part of security is knowing where the security weaknesses are. Building a threat model is like casing a house; you find out where the weak points are.

Instructions:

  1. You're part of a team that needs to get inside a house, preferably without the people who live there knowing you broke in or suspecting that you're there for nefarious purposes. You don't ...

    Go Pro for ÂŁ249.99

    Unlock this activity and more with a Ministry of Testing Pro membership.

    • 700+ TestBash Sessions
    • On-demand Courses
    • Online conferences
    • 99-Minute Workshops
    • 25+ Ready to use team activites
    Go Pro
Daniel Billing's profile

Daniel Billing

Senior Software Engineer

Kate Paulk's profile

Kate Paulk

Systems Quality Analyst

30 Days of Security Testing
Security in the Wild: Being at the Top of the Food Chain - Renato Rodrigues
Threat Modelling: How Software Survives in a Hacker’s Universe Saskia Coplans
Skyrocket Your Test Coverage With Model-Based Testing Using TestCompass
Exploratory Testing: LIVE - Adam Howard
Threat Modelling: How Software Survives in a Hacker’s Universe Saskia Coplans
Let’s Go Threat Modelling (TestBash UK 2022)
With a combination of SAST, SCA, and QA, we help developers identify vulnerabilities in applications and remediate them rapidly. Get your free trial today!
Explore MoT
TestBash Brighton 2024
Thu, 12 Sep 2024, 9:00 AM
We’re shaking things up and bringing TestBash back to Brighton on September 12th and 13th, 2024.
Web Application Security Testing 101 - Dan Billing
Get started with security testing web application