The New Oil | What is Threat Modeling? @TheNewOil | Uploaded July 2021 | Updated October 2024, 1 hour ago.
"Threat modeling" is a term you hear thrown around a lot in the privacy and security communities, but what does it mean? Do you need one? How do you make in? In this video, I'll answer these questions for you!
Learn more at thenewoil.org/en/guides/prologue/threat-model
Support us with a merch store, affiliate links, and more at thenewoil.org/en/support
You can also view these videos on other websites.
PeerTube: apertatube.net/c/thenewoil/videos
YouTube: youtube.com/thenewoil
0:00 Introduction
0:23 Threat Modeling
1:50 How do you build your own threat model?
2:07 Step 1: "What Do I Want To Protect?"
2:43 Step 2: "Who Do I Want To Protect This Stuff From?"
3:25 Step 3: "What Will Happen If I Fail?"
4:01 Step 4: "How Likely Is It That I Will Have To Protect This?"
4:37 Step 5: "How Much Trouble Am I Willing To Go Through?"
5:45 Step 6: ACT!
"Threat modeling" is a term you hear thrown around a lot in the privacy and security communities, but what does it mean? Do you need one? How do you make in? In this video, I'll answer these questions for you!
Learn more at thenewoil.org/en/guides/prologue/threat-model
Support us with a merch store, affiliate links, and more at thenewoil.org/en/support
You can also view these videos on other websites.
PeerTube: apertatube.net/c/thenewoil/videos
YouTube: youtube.com/thenewoil
0:00 Introduction
0:23 Threat Modeling
1:50 How do you build your own threat model?
2:07 Step 1: "What Do I Want To Protect?"
2:43 Step 2: "Who Do I Want To Protect This Stuff From?"
3:25 Step 3: "What Will Happen If I Fail?"
4:01 Step 4: "How Likely Is It That I Will Have To Protect This?"
4:37 Step 5: "How Much Trouble Am I Willing To Go Through?"
5:45 Step 6: ACT!