Threat Modeling: uncover vulnerabilities without looking at code - Chris Romeo

Sdílet
Vložit

Komentáře • 6

  • @berndeckenfels
    @berndeckenfels Před 3 lety +1

    It’s a repeating loop even If you not change the project. New attacks and techniques become known and on each iteration you can go deeper and be more creative or stricter. An iteration does not guarantee you are proofen secure/complete.

  • @yungesqargo1493
    @yungesqargo1493 Před 4 lety +1

    Java example: you said authentication - Great answer(s)... Code review is also good solution- Thanks 💸

  • @zainab6140
    @zainab6140 Před 4 lety +1

    great presentation and content 👍 thank you!

  • @nmkkannan1256
    @nmkkannan1256 Před 2 lety +1

    No Auth, No cryptography storage, PCI data is process as a plain text.

  • @chrisadams27
    @chrisadams27 Před 2 lety

    "Not an elite force" Classic!!

  • @ntobopascalineefeh4531
    @ntobopascalineefeh4531 Před 4 lety +1

    Great explanation. Can you help sir. I am stuck in on threat modeling homework.