Details

Risk Centric Threat Modeling


Risk Centric Threat Modeling

Process for Attack Simulation and Threat Analysis
1. Aufl.

von: Tony UcedaVelez, Marco M. Morana

100,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 12.05.2015
ISBN/EAN: 9781118988350
Sprache: englisch
Anzahl Seiten: 696

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p>This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns.  </p> <p>This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat modeling and risk management is the focus of Chapter 5.  Chapter 6 and Chapter 7 examine Process for Attack Simulation and Threat Analysis (PASTA). Finally, Chapter 8 shows how to use the PASTA risk-centric threat modeling process to analyze the risks of specific threat agents targeting web applications. This chapter focuses specifically on the web application assets that include customer’s confidential data and business critical functionality that the web application provides.</p> <p>• Provides a detailed walkthrough of the PASTA methodology alongside software development activities, normally conducted via a standard SDLC process</p> <p>• Offers precise steps to take when combating threats to businesses</p> <p>• Examines real-life data breach incidents and lessons for risk management</p> <p><i>Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis</i> is a resource for software developers, architects, technical risk managers, and seasoned security professionals. </p>
<p>Foreword ix</p> <p>Preface xv</p> <p>List of Figures xvii</p> <p>List of Tables xxiii</p> <p><b>1 Threat Modeling Overview 1</b></p> <p>Definitions 1</p> <p>Origins and Use 3</p> <p>Summary 8</p> <p>Rationale and Evolution of Security Analysis 9</p> <p>Summary 19</p> <p>Building A Better Risk Model 19</p> <p>Summary 31</p> <p>Threat Anatomy 33</p> <p>Summary 48</p> <p>Crowdsourcing Risk Analytics 48</p> <p><b>2 Objectives and Benefits of Threat Modeling 63</b></p> <p>Defining a Risk Mitigation Strategy 63</p> <p>Improving Application Security 82</p> <p>Building Security in the Software Development Life Cycle 92</p> <p>Identifying Application Vulnerabilities and Design Flaws 104</p> <p>Analyzing Application Security Risks 118</p> <p><b>3 Existing Threat Modeling Approaches 137</b></p> <p>Security Software Risk-Based Variants 137</p> <p><b>4 Threat Modeling Within the SDLC 195</b></p> <p>Building Security in SDLC with Threat Modeling 195</p> <p>Integrating Threat Modeling Within The Different Types of SDLCs 205</p> <p><b>5 Threat Modeling and Risk Management 235</b></p> <p>Data Breach Incidents and Lessons for Risk Management 235</p> <p>Threats and Risk Analysis 259</p> <p>Risk-Based Threat Modeling 282</p> <p>Threat Modeling in Information Security and Risk</p> <p>Management Processes 289</p> <p>Threat Modeling Within Security Incident Response Processes 306</p> <p><b>6 Intro to PASTA 317</b></p> <p>Risk-Centric Threat Modeling 317</p> <p><b>7 Diving Deeper into PASTA 343</b></p> <p>Exploring the Seven Stages and Embedded Threat Modeling Activities 343</p> <p>Chapter Summary 478</p> <p><b>8 PASTA Use Case 479</b></p> <p>PASTA Use Case Example Walk-Through 479</p> <p>Glossary 633</p> <p>References 653</p> <p>Index 657</p>
<p><b>Tony UcedaVélez</b> is CEO at VerSprite, an Atlanta based security services firm assisting global MNCs on various areas of cyber security, secure software development, threat modeling and security risk management. Tony has worked and led teams in the areas of application security, penetration testing, security architecture, and technical risk management for various organizations in Utility, Banking, Government, Retail, Healthcare, and Information Services.</p> <p><b>Marco M Morana</b> serves as Senior Vice President-Application Security Architect for CitiGroup, where he is responsible for managing the architecture risk analysis and threat modeling program globally and leads global initiatives to mitigate risks of emerging cyber-threats targeting web applications of institutional clients. Marco has designed and developed business critical security software products for several Fortune 500 companies, and also for NASA.  </p> <p> </p>
<p><b>This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns.  </b></p> <p>This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat modeling and risk management is the focus of Chapter 5.  Chapter 6 and Chapter 7 examine Process for Attack Simulation and Threat Analysis (PASTA). Finally, Chapter 8 shows how to use the PASTA risk-centric threat modeling process to analyze the risks of specific threat agents targeting web applications. This chapter focuses specifically on the web application assets that include customer’s confidential data and business critical functionality that the web application provides.</p> <ul> <li>Provides a detailed walkthrough of the PASTA methodology alongside software development activities, normally conducted via a standard SDLC process</li> <li>Offers precise steps to take when combating threats to businesses</li> <li>Examines real-life data breach incidents and lessons for risk management</li> </ul> <p><i>Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis</i>is a resource for software developers, architects, technical risk managers, and seasoned security professionals. </p> <p><b>Tony UcedaVélez</b> is CEO at VerSprite, an Atlanta based security services firm assisting global MNCs on various areas of cyber security, secure software development, threat modeling and security risk management. Tony has worked and led teams in the areas of application security, penetration testing, security architecture, and technical risk management for various organizations in Utility, Banking, Government, Retail, Healthcare, and Information Services.</p> <b>Marco M Morana</b> serves as Senior Vice President-Application Security Architect for CitiGroup, where he is responsible for managing the architecture risk analysis and threat modeling program globally and leads global initiatives to mitigate risks of emerging cyber-threats targeting web applications of institutional clients. Marco has designed and developed business critical security software products for several Fortune 500 companies, and also for NASA.   

Diese Produkte könnten Sie auch interessieren:

Projektmanagement und Prozessmessung
Projektmanagement und Prozessmessung
von: Ernst Jankulik, Peter Kuhlang, Roland Piff
PDF ebook
51,99 €
Project Management
Project Management
von: Harold Kerzner
PDF ebook
71,99 €