SlideShare une entreprise Scribd logo
1  sur  50
Télécharger pour lire hors ligne
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
Jerry:	
  Well,	
  what	
  makes	
  them	
  think	
  you're	
  a	
  risk	
  management	
  expert?	
  
George:	
  I	
  guess	
  it's	
  on	
  my	
  resume.	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  https://v.gd/ConFooThreatModel01ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  
Ceci n’est pas un hacker.
ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  
Mais ceci oui ce sont des hackers.	
  
dedicated,	
  human	
  adversaries	
  
ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
https://v.gd/ConFooThreatModel02
Threat Model 101
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
By	
  James	
  Mickens	
  
•  idenKfy	
  assets	
  
•  idenKfy	
  vulnerabiliKes	
  
•  idenKfy	
  likely	
  threat	
  actors	
  
	
  	
  	
  	
  (categorized	
  by	
  objecKves	
  &	
  capabiliKes)	
  
•  idenKfy	
  defensive	
  capabiliKes	
  
•  determine	
  risk	
  score	
  
•  rinse	
  and	
  repeat	
  
Threat Model 101
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
Figure	
  out	
  what	
  you	
  can	
  defend	
  
against	
  whom,	
  eh?	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
Figure	
  out	
  what	
  you	
  can	
  defend	
  
against	
  whom,	
  eh?	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
A	
  Concept	
  is	
  Stronger	
  than	
  a	
  Fact.	
  
-­‐	
  Charlo)e	
  Perkins	
  Gilman	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
WWW
Webservice
WWW
WWW Server
WWW
WWW Server
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
WWW
Webservice
Different	
  /	
  separate	
  
Threat	
  Models	
  @jschauma	
  ConFoo	
  Vancouver	
  2016	
  
Threat	
   Property	
  
Spoofing	
   AuthenKcaKon	
  
Tampering	
   Integrity	
  
RepudiaKon	
   Non-­‐RepudiaKon	
  
InformaKon	
  Disclosure	
   ConfidenKality	
  
Denial	
  of	
  Service	
   Availability	
  
ElevaKon	
  of	
  Privilege	
   AuthorizaKon	
  
STRIDE	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
DREAD	
  
Damage	
   How	
  bad	
  would	
  the	
  a_ack	
  be?	
  
Reproducability	
   How	
  easy	
  to	
  recreate	
  the	
  a_ack?	
  
Exploitability	
   How	
  easy	
  to	
  launch	
  the	
  a_ack?	
  
Affected	
  Users	
   How	
  many	
  are	
  impacted?	
  
Discoverability	
   How	
  easy	
  to	
  discover	
  for	
  a_acker?	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
DREAD+D	
  
Damage	
   How	
  bad	
  would	
  the	
  a_ack	
  be?	
  
Reproducability	
   How	
  easy	
  to	
  recreate	
  the	
  a_ack?	
  
Exploitability	
   How	
  easy	
  to	
  launch	
  the	
  a_ack?	
  
Affected	
  Users	
   How	
  many	
  are	
  impacted?	
  
Discoverability	
   How	
  easy	
  to	
  discover	
  for	
  a_acker?	
  
DetecKon	
   How	
  hard	
  to	
  detect	
  for	
  defender?	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
DREAD+D	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
https://v.gd/ConFooThreatModel03
•  competing incentives
•  industry espionage
•  covert operations
•  low risk profile
•  bound by (some) rules
•  married to a supercomputer
Know Your Enemy
https://v.gd/ConFooThreatModel04
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
•  low skill level
•  opportunistic
•  chaotic, yet predictable
•  there may be more than you think
•  never wears pants
https://v.gd/ConFooThreatModel04
Know Your Enemy
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
•  specific objective
•  targeted attacks
•  resourceful
•  relentless
•  only bound by gravity
https://v.gd/ConFooThreatModel04
Know Your Enemy
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
•  very powerful / resourceful
•  may have privileged controls
•  operates both clandestine & overt
•  may utilize Wile E. Coyote,
Mayor Quimby, Fat Tony
https://v.gd/ConFooThreatModel04
Know Your Enemy
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
Understanding	
  your	
  adversaries'	
  
moKves	
  and	
  capabiliKes	
  is	
  criKcal.	
  
	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
https://xkcd.com/538/
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
Also works.
https://xkcd.com/538/
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
Threat	
  Modeling	
  Process	
  
•  idenKfy	
  assets,	
  assign	
  values	
  
•  use	
  STRIDE	
  to	
  idenKfy	
  threats	
  
•  use	
  DREAD+D	
  to	
  derive	
  threat	
  score	
  
•  determine	
  /	
  recommend	
  defenses	
  
•  zoom	
  out	
  /	
  zoom	
  in	
  &	
  repeat	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
Your	
  adversaries	
  are	
  people,	
  too.	
  
Understand	
  their	
  moKves.	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
You	
  can't	
  defend	
  against	
  all	
  threats	
  
all	
  of	
  the	
  Kme.	
  
	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
A_ackers	
  will	
  go	
  for	
  the	
  lowest	
  hanging	
  fruit.	
  
	
  
Raising	
  the	
  cost	
  of	
  a_ack	
  –	
  not	
  eliminaKng	
  the	
  
enKre	
  threat	
  –	
  is	
  frequently	
  sufficient.	
  
@jschauma	
  ConFoo	
  Vancouver	
  2016	
  
@jschauma	
  
•  Know	
  your	
  enemy.	
  Understand	
  their	
  moKves.	
  
•  Know	
  your	
  vulnerabiliKes.	
  Rank	
  your	
  threats.	
  
•  Know	
  your	
  defensive	
  capabiliKes.	
  Be	
  realis6c.	
  
PrioriKze	
  what	
  ma_ers.	
  
ConFoo	
  Vancouver	
  2016	
  

Contenu connexe

Tendances

Microsoft Office 365 Commercial Licensing from Atidan
Microsoft Office 365 Commercial Licensing from AtidanMicrosoft Office 365 Commercial Licensing from Atidan
Microsoft Office 365 Commercial Licensing from Atidan
David J Rosenthal
 

Tendances (20)

Azure Hub spoke v1.0
Azure Hub spoke v1.0Azure Hub spoke v1.0
Azure Hub spoke v1.0
 
Windows Azure Virtual Machines
Windows Azure Virtual MachinesWindows Azure Virtual Machines
Windows Azure Virtual Machines
 
Cloud arch patterns
Cloud arch patternsCloud arch patterns
Cloud arch patterns
 
Azure Active Directory | Microsoft Azure Tutorial for Beginners | Azure 70-53...
Azure Active Directory | Microsoft Azure Tutorial for Beginners | Azure 70-53...Azure Active Directory | Microsoft Azure Tutorial for Beginners | Azure 70-53...
Azure Active Directory | Microsoft Azure Tutorial for Beginners | Azure 70-53...
 
Using Virtual Private Cloud (vpc)
Using Virtual Private Cloud (vpc)Using Virtual Private Cloud (vpc)
Using Virtual Private Cloud (vpc)
 
Azure vnet
Azure vnetAzure vnet
Azure vnet
 
Az 104 session 8 azure monitoring
Az 104 session 8 azure monitoringAz 104 session 8 azure monitoring
Az 104 session 8 azure monitoring
 
Microsoft Azure - Introduction to microsoft's public cloud
Microsoft Azure - Introduction to microsoft's public cloudMicrosoft Azure - Introduction to microsoft's public cloud
Microsoft Azure - Introduction to microsoft's public cloud
 
Services comparison among Microsoft Azure AWS and Google Cloud Platform
Services comparison among Microsoft Azure AWS and Google Cloud PlatformServices comparison among Microsoft Azure AWS and Google Cloud Platform
Services comparison among Microsoft Azure AWS and Google Cloud Platform
 
Azure Networking - The First Technical Challenge
Azure Networking  - The First Technical ChallengeAzure Networking  - The First Technical Challenge
Azure Networking - The First Technical Challenge
 
Enable Authentication and Authorization with Azure Active Directory and Sprin...
Enable Authentication and Authorization with Azure Active Directory and Sprin...Enable Authentication and Authorization with Azure Active Directory and Sprin...
Enable Authentication and Authorization with Azure Active Directory and Sprin...
 
Azure role based access control (rbac)
Azure role based access control (rbac)Azure role based access control (rbac)
Azure role based access control (rbac)
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud Services
 
Introducing Azure SQL Database
Introducing Azure SQL DatabaseIntroducing Azure SQL Database
Introducing Azure SQL Database
 
Shaping serverless architecture with domain driven design patterns - py web-il
Shaping serverless architecture with domain driven design patterns - py web-ilShaping serverless architecture with domain driven design patterns - py web-il
Shaping serverless architecture with domain driven design patterns - py web-il
 
DNS resolver 1.1.1.1 from Cloudflare
DNS resolver 1.1.1.1 from CloudflareDNS resolver 1.1.1.1 from Cloudflare
DNS resolver 1.1.1.1 from Cloudflare
 
Introduction to AWS Glue
Introduction to AWS Glue Introduction to AWS Glue
Introduction to AWS Glue
 
Azure Fundamentals || AZ-900
Azure Fundamentals || AZ-900Azure Fundamentals || AZ-900
Azure Fundamentals || AZ-900
 
Count min sketch
Count min sketchCount min sketch
Count min sketch
 
Microsoft Office 365 Commercial Licensing from Atidan
Microsoft Office 365 Commercial Licensing from AtidanMicrosoft Office 365 Commercial Licensing from Atidan
Microsoft Office 365 Commercial Licensing from Atidan
 

En vedette

Pp10 input process-output
Pp10 input process-outputPp10 input process-output
Pp10 input process-output
menisantixs
 
Data and Information - Input, Process and Output
Data and Information - Input, Process and OutputData and Information - Input, Process and Output
Data and Information - Input, Process and Output
shiplakeict
 
The IPO Model of Evaluation (Input-Process-Output)
The IPO Model of Evaluation (Input-Process-Output)The IPO Model of Evaluation (Input-Process-Output)
The IPO Model of Evaluation (Input-Process-Output)
Janilo Sarmiento
 
Chapter 3 job analysis, strategic planning, job description and job specifica...
Chapter 3 job analysis, strategic planning, job description and job specifica...Chapter 3 job analysis, strategic planning, job description and job specifica...
Chapter 3 job analysis, strategic planning, job description and job specifica...
Zaidatul Zaid
 

En vedette (16)

Dealing with your enemy at work
Dealing with your enemy at workDealing with your enemy at work
Dealing with your enemy at work
 
The enemy within
The enemy withinThe enemy within
The enemy within
 
Allah - Lord of Universe - Speak to Human
Allah - Lord of Universe - Speak to Human Allah - Lord of Universe - Speak to Human
Allah - Lord of Universe - Speak to Human
 
Learn 20 Well Mannered Words To Insult Your Enemy
Learn 20 Well Mannered Words To Insult Your EnemyLearn 20 Well Mannered Words To Insult Your Enemy
Learn 20 Well Mannered Words To Insult Your Enemy
 
Kill ur enemy
Kill ur enemyKill ur enemy
Kill ur enemy
 
The Eagle Went Over The Mountain
The Eagle Went Over The MountainThe Eagle Went Over The Mountain
The Eagle Went Over The Mountain
 
Pp10 input process-output
Pp10 input process-outputPp10 input process-output
Pp10 input process-output
 
The Enemy is within You
The Enemy is within YouThe Enemy is within You
The Enemy is within You
 
Proactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor TypesProactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor Types
 
Overall Equipment Effectiveness
Overall Equipment EffectivenessOverall Equipment Effectiveness
Overall Equipment Effectiveness
 
Data and Information - Input, Process and Output
Data and Information - Input, Process and OutputData and Information - Input, Process and Output
Data and Information - Input, Process and Output
 
The IPO Model of Evaluation (Input-Process-Output)
The IPO Model of Evaluation (Input-Process-Output)The IPO Model of Evaluation (Input-Process-Output)
The IPO Model of Evaluation (Input-Process-Output)
 
Chapter 3 job analysis, strategic planning, job description and job specifica...
Chapter 3 job analysis, strategic planning, job description and job specifica...Chapter 3 job analysis, strategic planning, job description and job specifica...
Chapter 3 job analysis, strategic planning, job description and job specifica...
 
The CMO's Greatest Enemy -- delivered at SxSW 2017
The CMO's Greatest Enemy -- delivered at SxSW 2017The CMO's Greatest Enemy -- delivered at SxSW 2017
The CMO's Greatest Enemy -- delivered at SxSW 2017
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process Management
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similaire à Know Your Enemy - An Introduction to Threat Modeling

How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
Adam Barrera
 
CONFidence 2015: MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect ...
CONFidence 2015: MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect ...CONFidence 2015: MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect ...
CONFidence 2015: MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect ...
PROIDEA
 

Similaire à Know Your Enemy - An Introduction to Threat Modeling (20)

OpSec101
OpSec101OpSec101
OpSec101
 
It's the people, stupid.
It's the people, stupid.It's the people, stupid.
It's the people, stupid.
 
The Infosec Crossroads - 44CON 2016
The Infosec Crossroads - 44CON 2016The Infosec Crossroads - 44CON 2016
The Infosec Crossroads - 44CON 2016
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
PCI Compliance for Hipsters
PCI Compliance for HipstersPCI Compliance for Hipsters
PCI Compliance for Hipsters
 
2018-05-09_CRAFTConf_FirstStepsMovingToTheCloud
2018-05-09_CRAFTConf_FirstStepsMovingToTheCloud2018-05-09_CRAFTConf_FirstStepsMovingToTheCloud
2018-05-09_CRAFTConf_FirstStepsMovingToTheCloud
 
A Sober Look at Machine Learning
A Sober Look at Machine LearningA Sober Look at Machine Learning
A Sober Look at Machine Learning
 
Demand Attention Now! Create Your Visual Moment of Truth
Demand Attention Now!  Create Your Visual Moment of TruthDemand Attention Now!  Create Your Visual Moment of Truth
Demand Attention Now! Create Your Visual Moment of Truth
 
VR Demystified: Delivering Experiences Beyond the Screen
VR Demystified: Delivering Experiences Beyond the ScreenVR Demystified: Delivering Experiences Beyond the Screen
VR Demystified: Delivering Experiences Beyond the Screen
 
Hackfest 2019 Talk
Hackfest 2019 TalkHackfest 2019 Talk
Hackfest 2019 Talk
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
 
Edge 2016 barbarians at the gateway
Edge 2016 barbarians at the gatewayEdge 2016 barbarians at the gateway
Edge 2016 barbarians at the gateway
 
CONFidence 2015: MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect ...
CONFidence 2015: MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect ...CONFidence 2015: MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect ...
CONFidence 2015: MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect ...
 
Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...
Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...
Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...
 
Mirai botnet
Mirai botnetMirai botnet
Mirai botnet
 
Web3 + scams = It's a match
Web3 + scams = It's a matchWeb3 + scams = It's a match
Web3 + scams = It's a match
 
Hack.LU - The Infosec Crossroads
Hack.LU - The Infosec CrossroadsHack.LU - The Infosec Crossroads
Hack.LU - The Infosec Crossroads
 
What can social psychology teach us about (better) UX research?
What can social psychology teach us about (better) UX research?What can social psychology teach us about (better) UX research?
What can social psychology teach us about (better) UX research?
 
Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi...
Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi...Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi...
Teaching Elephants to Dance (Federal Audience): A Developer's Journey to Digi...
 
Data driven devops as presented at QCon London 2018
Data driven devops as presented at QCon London 2018Data driven devops as presented at QCon London 2018
Data driven devops as presented at QCon London 2018
 

Plus de Jan Schaumann

Plus de Jan Schaumann (16)

The Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS BaggageThe Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS Baggage
 
Crazy Like A Fox - #Infosec Ideas That Just Might Work
Crazy Like A Fox - #Infosec Ideas That Just Might WorkCrazy Like A Fox - #Infosec Ideas That Just Might Work
Crazy Like A Fox - #Infosec Ideas That Just Might Work
 
Semper Ubi Sub Ubi - Things They Don't Teach You In School
Semper Ubi Sub Ubi - Things They Don't Teach You In SchoolSemper Ubi Sub Ubi - Things They Don't Teach You In School
Semper Ubi Sub Ubi - Things They Don't Teach You In School
 
Everything is Awful (And You're Not Helping)
Everything is Awful (And You're Not Helping)Everything is Awful (And You're Not Helping)
Everything is Awful (And You're Not Helping)
 
Defense at Scale
Defense at ScaleDefense at Scale
Defense at Scale
 
Primum non nocere - Ethical Obligations in Internet Operations
Primum non nocere - Ethical Obligations in Internet OperationsPrimum non nocere - Ethical Obligations in Internet Operations
Primum non nocere - Ethical Obligations in Internet Operations
 
Protecting Data in Untrusted Locations
Protecting Data in Untrusted LocationsProtecting Data in Untrusted Locations
Protecting Data in Untrusted Locations
 
Headless Host Scanning
Headless Host ScanningHeadless Host Scanning
Headless Host Scanning
 
Safely Drinking from the Data Waterhose
Safely Drinking from the Data WaterhoseSafely Drinking from the Data Waterhose
Safely Drinking from the Data Waterhose
 
PGP for Smarties
PGP for SmartiesPGP for Smarties
PGP for Smarties
 
Fancy pants
Fancy pantsFancy pants
Fancy pants
 
Ipv6 basics
Ipv6 basicsIpv6 basics
Ipv6 basics
 
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load BalancingL3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
 
Building better tools
Building better toolsBuilding better tools
Building better tools
 
Useless use of *
Useless use of *Useless use of *
Useless use of *
 
DST @ Yahoo!
DST @ Yahoo!DST @ Yahoo!
DST @ Yahoo!
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Know Your Enemy - An Introduction to Threat Modeling