AppSec Decoded: Scoping and data gathering in threat modeling | Synopsys
Learn how Synopsys handles scoping and data gathering, two of five necessary steps in creating a useful threat modeling. https://www.synopsys.com/software-integrity/resources/white-papers/threat-modeling-best-practices.html
Learn more about Synopsys Software Integrity: https://www.synopsys.com/software-integrity.html
Subscribe: https://www.youtube.com/synopsys
Follow Synopsys on Twitter: https://twitter.com/SynopsysAppsec
Like Synopsys on Facebook: https://www.facebook.com/synopsyssoftwareintegrity
Follow Synopsys Software Integrity on LinkedIn: https://www.LinkedIn.com/showcase/sw_integrity
▬ Contents of this video ▬▬▬▬▬▬▬▬▬▬
0:00 - Intro
1:25 - The goal of threat modeling
3:37 - Scoping - What you want to protect
6:02 - Data gathering - Identify components and their interactions