Imagine having your airbag enabled or disabled remotely without you knowing. This is one example of a threat scenario that definitely needs to be taken into consideration and avoided. How? You might ask. You will find the answer to that question in this video course “Threat Analysis (G8_3)”, where we will explain you how to analyze threats in a structured manner to protect vehicles by systematically identifying potential threat scenarios from the viewpoint of an attacker.

First and foremost, we will give you a brief overview and define what threat analysis is. Secondly, we will explain in detail what the most used model for classification of threats the so-called STRIDE model is and break down the different threat scenarios of the STRIDE model.

Furthermore, we will go through the recommended approach to threat scenario identification, this approach will be consisted of five steps starting with choosing a threat scenario model and in this case, we will be covering the model explained in the first part of the video Microsoft’s STRIDE model.


Course plan

All Videos
G8_3 Threat Analysis