The below video provides an introduction to the theory behind threat modelling and analysis using the STRIDE categorization scheme. It provides a way to identify threats to software you are developing yourself as well as off-the-shelf software products.
This is useful for anyone studing for the ISC2 CISSP Certified Information Systems Security Professional certification, or for other cybersecurity certifications such as the ISACA CISM exam.
The video talks about the theory on creating a data flow diagram, and how the analysis is then applied. In a future video I plan to create another video with a practical example of how to apply STRIDE analysis to an open source software projects.
The 6 steps to STRIDE are:
Please subscribe to Penguin Fortress on YouTube for future videos.
For more details about how security see the following guides: