threat-modelling
security
models

First Steps in Security - Threat Modeling

  • Locked

A key part of security is knowing where the security weaknesses are. Building a threat model is like casing a house; you find out where the weak points are.

Instructions:

  1. You're part of a team that needs to get inside a house, preferably without the people who live there knowing you broke in or suspecting that you're there for nefarious purposes. You don't ...

    Go Pro for £249.99

    Unlock this activity and more with a Ministry of Testing Pro membership.

    • 700+ TestBash Sessions
    • On-demand Courses
    • Online conferences
    • 99-Minute Workshops
    • 25+ Ready to use team activites
    Go Pro
Daniel Billing's profile

Daniel Billing

Senior Software Engineer

Kate Paulk's profile

Kate Paulk

Systems Quality Analyst

TestBash Revisited - Threat Modelling: How Software Survives in a Hacker’s Universe - Saskia Coplans
Exploring Security in Day-to-day Testing
The Bittersweetness of Security Testing - Anne Oikarinen
Power of Models - Dan Ashby & Richard Bradshaw
Threat Modelling: How Software Survives in a Hacker’s Universe Saskia Coplans
What Are Models?
Let’s Go Threat Modelling (TestBash UK 2022)
This open-source tool is the #1 Automation Test Reporting Tool loved by the community and the developing team plans to share their knowledge via a learning course. Stay tuned!
Explore MoT
TestBash Brighton 2024
Thu, 12 Sep 2024, 9:00 AM
We’re shaking things up and bringing TestBash back to Brighton on September 12th and 13th, 2024.
MoT Foundation Certificate in Test Automation
Unlock the essential skills to transition into Test Automation through interactive, community-driven learning, backed by industry expertise