03455nam 2200649 450 991083069010332120220307133806.01-118-98835-31-118-98837-X(CKB)2670000000616822(EBL)1895868(OCoLC)904400187(SSID)ssj0001482780(PQKBManifestationID)12496514(PQKBTitleCode)TC0001482780(PQKBWorkID)11412439(PQKB)11375067(MiAaPQ)EBC1895868(DLC) 2015008691(MiAaPQ)EBC4653001(Au-PeEL)EBL4653001(CaSebORM)9780470500965(EXLCZ)99267000000061682220220307d2015 uy 0engur|n|---|||||txtccrApplication threat modeling process for attack simulation and threat analysis /Tony UcedaVelez, Marco M. Morana1st editionHoboken, New Jersey :John Wiley & Sons, Inc.,[2015]©20151 online resource (693 p.)Description based upon print version of record.1-118-98836-1 0-470-50096-4 Includes bibliographical references and index.Cover; Title Page; Copyright; Dedication; Contents; Foreword; Preface; List of Figures; List of Tables; Chapter 1 Threat Modeling Overview; Definitions; Origins and Use; Summary; Rationale and Evolution of Security Analysis; Summary; Building A Better Risk Model; Summary; Threat Anatomy; Summary; Crowdsourcing Risk Analytics; Chapter 2 Objectives and Benefits of Threat Modeling; Defining a Risk Mitigation Strategy; Improving Application Security; Building Security in the Software Development Life Cycle; Identifying Application Vulnerabilities and Design FlawsAnalyzing Application Security RisksChapter 3 Existing Threat Modeling Approaches; Security, Software, Risk-Based Variants; Chapter 4 Threat Modeling Within the SDLC; Building Security in SDLC with Threat Modeling; Integrating Threat Modeling Within The Different Types of SDLCs; Chapter 5 Threat Modeling and Risk Management; Data Breach Incidents and Lessons for Risk Management; Threats and Risk Analysis; Risk-Based Threat Modeling; Threat Modeling in Information Security and Risk Management Processes; Threat Modeling Within Security Incident Response Processes; Chapter 6 Intro to PASTARisk-Centric Threat ModelingChapter 7 Diving Deeper into PASTA; Exploring the Seven Stages and Embedded Threat Modeling Activities; Chapter Summary; Chapter 8 PASTA Use Case; PASTA Use Case Example Walk-Through; Glossary; References; Index; EULA"This book describes how to apply application threat modeling as an advanced preventive form of security"--Provided by publisher.Management information systemsSecurity measuresComputer securityManagement information systemsSecurity measures.Computer security.658.4038POL037000bisacshUceda Vélez Tony1976-1603125Morana Marco M.MiAaPQMiAaPQMiAaPQBOOK9910830690103321Application threat modeling3927383UNINA