Risk Centric Threat Modeling : Process for Attack Simulation and Threat Analysis - Tony UcedaVelez

Risk Centric Threat Modeling

Process for Attack Simulation and Threat Analysis

By: Tony UcedaVelez, Marco M. Morana

Hardcover | 15 May 2015 | Edition Number 1

At a Glance

Hardcover


RRP $200.95

$121.25

40%OFF

or 4 interest-free payments of $30.31 with

 or 

Aims to ship in 7 to 10 business days

This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns.  

This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat modeling and risk management is the focus of Chapter 5.  Chapter 6 and Chapter 7 examine Process for Attack Simulation and Threat Analysis (PASTA). Finally, Chapter 8 shows how to use the PASTA risk-centric threat modeling process to analyze the risks of specific threat agents targeting web applications. This chapter focuses specifically on the web application assets that include customer?s confidential data and business critical functionality that the web application provides.

? Provides a detailed walkthrough of the PASTA methodology alongside software development activities, normally conducted via a standard SDLC process

? Offers precise steps to take when combating threats to businesses

? Examines real-life data breach incidents and lessons for risk management

Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis is a resource for software developers, architects, technical risk managers, and seasoned security professionals. 

More in Business & Management

The Intelligent Investor Third Edition - Benjamin Graham

RRP $36.99

$32.95

11%
OFF
Lessons from Gin : Business the Four Pillars Way - Matt Jones
Principles : Life and Work - Ray Dalio

RRP $55.00

$39.90

27%
OFF
The Barefoot Investor : Classic Edition, Revised and Updated - Scott Pape
Outwitting the Devil : The Secret to Freedom and Success - Napoleon Hill
Elevate - Jack Delosa

Paperback

RRP $34.99

$33.25

How to Win Friends and Influence People - Dale Carnegie
Art Of War : Arcturus Silkbound Classics - Sun Tzu

RRP $36.99

$33.95

The Laws of Human Nature - Robert Greene

RRP $39.99

$37.95

The 5am Club : Own Your Morning. Elevate Your Life. - Robin Sharma
The Algebra of Wealth : A Simple Formula for Success - Scott Galloway
Barefoot Kids : The new book from The Barefoot Investor - Scott Pape
Extreme Ownership - Jocko Willink

RRP $29.99

$28.50