Microsoft

Podcasts:How Microsoft IT Manages Security Knowledge for Better Application Risk Management

Share
Language:
English
The process of threat modeling is built on a simple principle: To build a feasibly secure system, one must understand all the threats in that system. The challenge, however, is in making threat modeling more accessible to non-specialists.
  • Details

    Note: There are multiple files available for this download. Once you click on the “Download” button, you will be prompted to select the files you need.
    Version:
    Date Published:

    3.0

    12/3/2009

    File name:
    File size:

    bmo041106.mp3

    23.5 MB

    bmo041106.wma

    7.5 MB

      The process of threat modeling is built on a simple principle: To build a feasibly secure system, one must understand all the threats in that system. The challenge, however, is in making threat modeling more accessible to non-specialists. Microsoft has developed a process through which minimal input can produce a feature-rich threat model that identifies a wide range of critical information including contextual threats, trust boundaries, fracture points, attack surfaces, and direct and transitive access control. This webcast describes and demonstrates this threat modeling process, outlines its benefits, and shows how threat modeling fits into the Microsoft Security Development Lifecycle.
  • System Requirements

    Supported Operating System

    Windows XP


  • Install Instructions

      1. Click Download to start the download.

      2. Copy the file to your computer by clicking the Save button.

Popular downloads

Free PC updates

  • Security patches
  • Software updates
  • Service packs
  • Hardware drivers
Run Microsoft Update
close
moreinfo