AppSec Decoded: Evaluating threats with threat modeling risk analysis | Synopsys
Learn how risk analysis, the final step in the threat modeling, helps guide an organization’s response to threats.
Download the whitepaper here: https://www.synopsys.com/software-integrity/resources/white-papers/threat-modeling-best-practices.html
Learn more about Synopsys Software Integrity: https://www.synopsys.com/software-integrity.html
Subscribe: https://www.youtube.com/synopsys
Follow Synopsys on Twitter: https://twitter.com/SynopsysAppsec
Like Synopsys on Facebook: https://www.facebook.com/synopsyssoftwareintegrity
Follow Synopsys Software Integrity on LinkedIn: https://www.LinkedIn.com/showcase/sw_integrity
▬ Contents of this video ▬▬▬▬▬▬▬▬▬▬
0:00 - Intro
1:10 - What factors determine likelihood?
3:16 - How is the likelihood scale used?
4:52 - What factors help assess the possible impact of a threat?
6:45 - How is the impact ranking scale used?
8:23 - How does threat modeling make you a difficult target for an attack?