|
Product Description
In this straightforward and practical guide, Microsoft® application security specialists Frank Swiderski and Window Snyder describe the concepts and goals for threat modeling—a structured approach for identifying, evaluating, and mitigating risks to system security. Discover how to use the threat modeling methodology to analyze your system from the adversary’s point of view—creating a set of data points that help drive security specifications and testing. You’ll review application scenarios that illustrate threat modeling concepts in action, understanding how to use threat modeling to help improve the built-in security of a system—as well as your customer's confidence in the security of that system—regardless of development environment.
Gain an in-depth, conceptual understanding—along with practical ways to integrate threat modeling into your development efforts:
- Help anticipate attacks by seeing how adversaries assess your system—and compare their view to the developer’s or architect’s view
- Employ a data flow approach to create a threat profile for a system
- Reveal vulnerabilities in system architecture and implementation using investigative techniques such as threat trees and threat model-directed code reviews
- Develop a credible security characterization for modeling threats
- Use threat modeling to help verify security features and increase the resilience of software systems
- Increase customer confidence in your products!
Features
- Used Book in Good Condition
Customers Who Bought This Item Also Bought
- Writing Secure Code, Second Edition (Developer Best Practices)
- The Security Development Lifecycle (Developer Best Practices)
- Securing Systems: Applied Security Architecture and Threat Models
- Guide to Data-Centric System Threat Modeling: NiST SP 800-154
- Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
- Cybersecurity Blue Team Toolkit
- Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis
- Threat Modeling: Designing for Security
- Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
- Agile Application Security: Enabling Security in a Continuous Delivery Pipeline
*If this is not the "Threat Modeling (Microsoft Professional)" product you were looking for, you can check the other results by clicking this link. Details were last updated on Nov 8, 2024 01:30 +08.