This document discusses threat modeling and securing system design. It begins with an introduction of the presenter and an overview of threat modeling. Key points include defining security properties and threats using the STRIDE framework. It then covers decomposing a system into components, data, and roles. Methods for identifying potential issues include using threat modeling techniques like data flow diagrams and checklists. Risk analysis approaches are presented for prioritizing threats. Finally, resources for further information on topics like STRIDE, OWASP, and books are provided.
Related topics: