diff --git a/README.md b/README.md index 22c152c..8aad4d9 100644 --- a/README.md +++ b/README.md @@ -165,6 +165,10 @@ Also, study the history of attacks. If I was designing a prison, I'd learn about - [Awesome Threat Modeling](https://github.com/hysnsec/awesome-threat-modelling) - [Some thoughts on threat modeling](https://www.cs.auckland.ac.nz/~pgut001/pubs/threat_modelling.pdf) - [Threat modeling: 12 available methods](https://insights.sei.cmu.edu/sei_blog/2018/12/threat-modeling-12-available-methods.html) +- [Approachable threat modeling](https://increment.com/security/approachable-threat-modeling/) +- [OWASP Threat Model Cookbook](https://github.com/OWASP/threat-model-cookbook) +- [Threat modeling for dummies](https://www.slideshare.net/AdamEnglander/threat-modeling-for-dummies-cascadia-php-2018) +- [Threat modeling cheatsheet (from OWASP)](https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html) - [A Guide to Understanding Security Modeling in Trusted Systems](https://fas.org/irp/nsa/rainbow/tg010.pdf) - [Adversaries: Know Thy Opponent (from Saydjari's book)](https://learning.oreilly.com/library/view/engineering-trustworthy-systems/9781260118186/ch6.xhtml#ch6) - ["Who is your opponent?" (from Anderson's book)](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch2-dec18.pdf)