• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950560]
• Literatura piękna
 [1849509]

  więcej...
• Turystyka
 [71097]
• Informatyka
 [151150]
• Komiksy
 [35848]
• Encyklopedie
 [23178]
• Dziecięca
 [617388]
• Hobby
 [139064]
• AudioBooki
 [1657]
• Literatura faktu
 [228597]
• Muzyka CD
 [383]
• Słowniki
 [2855]
• Inne
 [445295]
• Kalendarze
 [1464]
• Podręczniki
 [167547]
• Poradniki
 [480102]
• Religia
 [510749]
• Czasopisma
 [516]
• Sport
 [61293]
• Sztuka
 [243352]
• CD, DVD, Video
 [3414]
• Technologie
 [219456]
• Zdrowie
 [101002]
• Książkowe Klimaty
 [124]
• Zabawki
 [2311]
• Puzzle, gry
 [3459]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8079]
Kategorie szczegółowe BISAC

Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis

ISBN-13: 9780470500965 / Angielski / Twarda / 2015 / 696 str.

Marco Morana; Tony Ucedavelez
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis Ucedavelez, Tony 9780470500965 John Wiley & Sons - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis

ISBN-13: 9780470500965 / Angielski / Twarda / 2015 / 696 str.

Marco Morana; Tony Ucedavelez
cena 479,43
(netto: 456,60 VAT:  5%)

Najniższa cena z 30 dni: 477,46
Termin realizacji zamówienia:
ok. 30 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!

This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns. This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat modeling and risk management is the focus of Chapter 5. Chapter 6 and Chapter 7 examine Process for Attack Simulation and Threat Analysis (PASTA). Finally, Chapter 8 shows how to use the PASTA risk-centric threat modeling process to analyze the risks of specific threat agents targeting web applications. This chapter focuses specifically on the web application assets that include customer's confidential data and business critical functionality that the web application provides. - Provides a detailed walkthrough of the PASTA methodology alongside software development activities, normally conducted via a standard SDLC process - Offers precise steps to take when combating threats to businesses - Examines real-life data breach incidents and lessons for risk management Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis is a resource for software developers, architects, technical risk managers, and seasoned security professionals.

Kategorie:
Technologie
Kategorie BISAC:
Political Science > Terrorism
Computers > Security - General
Business & Economics > Kierownictwo i motywacja
Wydawca:
John Wiley & Sons
Język:
Angielski
ISBN-13:
9780470500965
Rok wydania:
2015
Ilość stron:
696
Waga:
1.06 kg
Wymiary:
23.62 x 15.75 x 4.06
Oprawa:
Twarda
Wolumenów:
01
Dodatkowe informacje:
Bibliografia
Glosariusz/słownik

Foreword ix

Preface xv

List of Figures xvii

List of Tables xxiii

1 Threat Modeling Overview 1

Definitions 1

Origins and Use 3

Summary 8

Rationale and Evolution of Security Analysis 9

Summary 19

Building A Better Risk Model 19

Summary 31

Threat Anatomy 33

Summary 48

Crowdsourcing Risk Analytics 48

2 Objectives and Benefits of Threat Modeling 63

Defining a Risk Mitigation Strategy 63

Improving Application Security 82

Building Security in the Software Development Life Cycle 92

Identifying Application Vulnerabilities and Design Flaws 104

Analyzing Application Security Risks 118

3 Existing Threat Modeling Approaches 137

Security Software Risk–Based Variants 137

4 Threat Modeling Within the SDLC 195

Building Security in SDLC with Threat Modeling 195

Integrating Threat Modeling Within The Different Types of SDLCs 205

5 Threat Modeling and Risk Management 235

Data Breach Incidents and Lessons for Risk Management 235

Threats and Risk Analysis 259

Risk–Based Threat Modeling 282

Threat Modeling in Information Security and Risk

Management Processes 289

Threat Modeling Within Security Incident Response Processes 306

6 Intro to PASTA 317

Risk–Centric Threat Modeling 317

7 Diving Deeper into PASTA 343

Exploring the Seven Stages and Embedded Threat Modeling Activities 343

Chapter Summary 478

8 PASTA Use Case 479

PASTA Use Case Example Walk–Through 479

Glossary 633

References 653

Index 657

Tony UcedaVélez is CEO at VerSprite, an Atlanta based security services firm assisting global MNCs on various areas of cyber security, secure software development, threat modeling and security risk management. Tony has worked and led teams in the areas of application security, penetration testing, security architecture, and technical risk management for various organizations in Utility, Banking, Government, Retail, Healthcare, and Information Services.

Marco M Morana serves as Senior Vice President–Application Security Architect for CitiGroup, where he is responsible for managing the architecture risk analysis and threat modeling program globally and leads global initiatives to mitigate risks of emerging cyber–threats targeting web applications of institutional clients. Marco has designed and developed business critical security software products for several Fortune 500 companies, and also for NASA.  

 

This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk–centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns.  

This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat modeling and risk management is the focus of Chapter 5.  Chapter 6 and Chapter 7 examine Process for Attack Simulation and Threat Analysis (PASTA). Finally, Chapter 8 shows how to use the PASTA risk–centric threat modeling process to analyze the risks of specific threat agents targeting web applications. This chapter focuses specifically on the web application assets that include customer s confidential data and business critical functionality that the web application provides.

  • Provides a detailed walkthrough of the PASTA methodology alongside software development activities, normally conducted via a standard SDLC process
  • Offers precise steps to take when combating threats to businesses
  • Examines real–life data breach incidents and lessons for risk management

Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysisis a resource for software developers, architects, technical risk managers, and seasoned security professionals. 

Tony UcedaVélez is CEO at VerSprite, an Atlanta based security services firm assisting global MNCs on various areas of cyber security, secure software development, threat modeling and security risk management. Tony has worked and led teams in the areas of application security, penetration testing, security architecture, and technical risk management for various organizations in Utility, Banking, Government, Retail, Healthcare, and Information Services.

Marco M Morana serves as Senior Vice President–Application Security Architect for CitiGroup, where he is responsible for managing the architecture risk analysis and threat modeling program globally and leads global initiatives to mitigate risks of emerging cyber–threats targeting web applications of institutional clients. Marco has designed and developed business critical security software products for several Fortune 500 companies, and also for NASA.   



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia