Table of Contents
Preface
1
Game Play
What you’ll need to play the EoP game
Remote threat modeling
The cards
Alternative games
Who should participate?
How to play EoP
Preparation
Aim
To start
Don’t forget!
Points
Who goes next?
Who’s won?
Variations of gameplay
Obstacles
Scaling your threat modeling program
Performance metrics and reporting
Coming up
Summary
2
Spoofing
2. of Spoofing
3. of Spoofing
4. of Spoofing
5. of Spoofing
6. of Spoofing
7. of Spoofing I
7. of Spoofing II
8. of Spoofing
9. of Spoofing I
9. of Spoofing II
10. of Spoofing
Jack of Spoofing
Queen of Spoofing I
Queen of Spoofing II
King of Spoofing I
King of Spoofing II
Ace of Spoofing I
Ace of Spoofing II
Ace of Spoofing III
Ace of Spoofing IV
E. of Spoofing
Summary
References ...
Get Threat Modeling Gameplay with EoP now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.