Tag: cyber security
-
Threat Modeling Basics
Threat Modeling is the process of using models to identify and document potential threats to a system. This is the first post in a series, in which I am I document the process of threat modeling common information systems using commonly used threat modeling methodologies / frameworks. Threat modeling frameworks complement the 5 Functions of…
-
T-POT – All In One Multi Honeypot Platform
While dabbing in the technical realm of cyber security, I looked for open-source honeypot platforms to experiment with. After discovering a long list of possible options, I decided to deploy an instance of Deutsche Telekom Security’s T-Pot. Utilizing Docker for containerization, T-Pot runs the following honeypots simultaneously on a single host. To make it easy…