From the course: Threat Modeling: Tampering in Depth

Mitigate tampering threats

From the course: Threat Modeling: Tampering in Depth

Start my 1-month free trial

Mitigate tampering threats

- [Adam] Tampering, meddling with, stacking the deck, monkeying around, loading the dice, manipulating things, rigging a game. All of these attacks in the real world have equivalence in the world of cyber. This course is part of a series on threat modeling and the STRIDE threats. I'm Adam Shostack. I've written the most popular book on threat modeling, helped create the CVE, and I'm on the Black Hat Review Board. And in this course, you'll learn about threat modeling, a structured and systematic approach to finding security threats early in a project while there's time to address them. And we'll go in-depth into tampering and how to address it.

Contents