Risk centric threat modeling : process for attack simulation and threat analysis /

"This book describes how to apply application threat modeling as an advanced preventive form of security"--

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Morana, Marco M.
Άλλοι συγγραφείς: Uceda Vélez, Tony, 1976-
Μορφή: Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Hoboken, New Jersey : Wiley, 2015.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Title Page; Copyright; Table of Contents; Dedication; FOREWORD; PREFACE; REFERENCE; LIST OF FIGURES; LIST OF TABLES; CHAPTER 1: THREAT MODELING OVERVIEW; DEFINITIONS; ORIGINS AND USE; SUMMARY; RATIONALE AND EVOLUTION OF SECURITY ANALYSIS; SUMMARY; BUILDING A BETTER RISK MODEL; SUMMARY; THREAT ANATOMY; SUMMARY; CROWDSOURCING RISK ANALYTICS; CHAPTER 2: OBJECTIVES AND BENEFITS OF THREAT MODELING; DEFINING A RISK MITIGATION STRATEGY; IMPROVING APPLICATION SECURITY; BUILDING SECURITY IN THE SOFTWARE DEVELOPMENT LIFE CYCLE; IDENTIFYING APPLICATION VULNERABILITIES AND DESIGN FLAWS
  • ANALYZING APPLICATION SECURITY RISKSCHAPTER 3: EXISTING THREAT MODELING APPROACHES; SECURITY, SOFTWARE, RISK-BASED VARIANTS; CHAPTER 4: THREAT MODELING WITHIN THE SDLC; BUILDING SECURITY IN SDLC WITH THREAT MODELING; INTEGRATING THREAT MODELING WITHIN THE DIFFERENT TYPES OF SDLCs; CHAPTER 5: THREAT MODELING AND RISK MANAGEMENT; DATA BREACH INCIDENTS AND LESSONS FOR RISK MANAGEMENT; THREATS AND RISK ANALYSIS; RISK-BASED THREAT MODELING; THREAT MODELING IN INFORMATION SECURITY AND RISK MANAGEMENT PROCESSES; THREAT MODELING WITHIN SECURITY INCIDENT RESPONSE PROCESSES; CHAPTER 6: INTRO TO PASTA
  • RISK-CENTRIC THREAT MODELINGCHAPTER 7: DIVING DEEPER INTO PASTA; EXPLORING THE SEVEN STAGES AND EMBEDDED THREAT MODELING ACTIVITIES; CHAPTER SUMMARY; CHAPTER 8: PASTA USE CASE; PASTA USE CASE EXAMPLE WALK-THROUGH; GLOSSARY; INFORMATION SECURITY AND RISK MANAGEMENT TERMINOLOGY; REFERENCES; INDEX; End User License Agreement