Risk centric threat modeling : process for attack simulation and threat analysis / Tony Ucedavélez ; Marco M. Morana.
Tipo de material:
Contenidos:
Resumen: "This book describes how to apply application threat modeling as an advanced preventive form of security"-- Provided by publisher.
Foreword
Preface
List of Figures
List of Tables
Definitions -- Origins and Use -- Summary -- Rationale and Evolution of Security Analysis -- Summary -- Building A Better Risk Model -- Summary -- Threat Anatomy -- Summary -- Crowdsourving Risk Analytics. 1. Threat Modeling Overview
Defining a Risk Mitigation Strategy -- Improving Application Security -- Building Security in the Software Development Life Cycle -- Identifying Application Vulnerabilities and Design Flaws -- Analyzing Application Security Risks. 2. Objectives and Benefits of Threat Modeling
Security, Software, Risk-Based Variants 3. Existing Threat Modeling Approaches
Building Security in SDLC with Threat Modeling -- Integrating Threat Modeling Within The Different TYpes of SDLCs 4. Threat Modeling Within the SDLC
Data Breach Incidents and Lessons for Risk Management -- Threats and Risk Analysis -- risk-Based Threat Modeling -- Threat in Information Security and Risk Management Precesses 5. Threat Modeling and Risk Management
Risk-Centric Threat Modeling 6. Intro to PASTA
Exploring the Seven Stages and Embedded Threat Modeling Activities, Chapter Summary. 7. Diving Deeper into PASTA
PASTA Use Case Example Walk-Through 8. PASTA Use Case
Glossary
References
Index
No hay comentarios en este titulo.