Vai al contenuto principale della pagina
| Autore: |
Uceda Vélez Tony <1976->
|
| Titolo: |
Application threat modeling : process for attack simulation and threat analysis / / Tony UcedaVelez, Marco M. Morana
|
| Pubblicazione: | Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2015] |
| ©2015 | |
| Edizione: | 1st edition |
| Descrizione fisica: | 1 online resource (693 p.) |
| Disciplina: | 658.4038 |
| Soggetto topico: | Management information systems - Security measures |
| Computer security | |
| Classificazione: | POL037000 |
| Persona (resp. second.): | MoranaMarco M. |
| Note generali: | Description based upon print version of record. |
| Nota di bibliografia: | Includes bibliographical references and index. |
| Nota di contenuto: | Cover; Title Page; Copyright; Dedication; Contents; Foreword; Preface; List of Figures; List of Tables; Chapter 1 Threat Modeling Overview; Definitions; Origins and Use; Summary; Rationale and Evolution of Security Analysis; Summary; Building A Better Risk Model; Summary; Threat Anatomy; Summary; Crowdsourcing Risk Analytics; Chapter 2 Objectives and Benefits of Threat Modeling; Defining a Risk Mitigation Strategy; Improving Application Security; Building Security in the Software Development Life Cycle; Identifying Application Vulnerabilities and Design Flaws |
| Analyzing Application Security RisksChapter 3 Existing Threat Modeling Approaches; Security, Software, Risk-Based Variants; Chapter 4 Threat Modeling Within the SDLC; Building Security in SDLC with Threat Modeling; Integrating Threat Modeling Within The Different Types of SDLCs; Chapter 5 Threat Modeling and Risk Management; Data Breach Incidents and Lessons for Risk Management; Threats and Risk Analysis; Risk-Based Threat Modeling; Threat Modeling in Information Security and Risk Management Processes; Threat Modeling Within Security Incident Response Processes; Chapter 6 Intro to PASTA | |
| Risk-Centric Threat ModelingChapter 7 Diving Deeper into PASTA; Exploring the Seven Stages and Embedded Threat Modeling Activities; Chapter Summary; Chapter 8 PASTA Use Case; PASTA Use Case Example Walk-Through; Glossary; References; Index; EULA | |
| Sommario/riassunto: | "This book describes how to apply application threat modeling as an advanced preventive form of security"-- |
| Titolo autorizzato: | Application threat modeling ![]() |
| ISBN: | 1-118-98835-3 |
| 1-118-98837-X | |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9910830690103321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |