Chapter 5. Building Attack Paths – Threat Modeling an Application

The nation's protection relies on how it has been modeled to protect itself from probable threats.

In this chapter, we will discuss some basic principles of threat modeling a mobile application and how it can benefit the organization. We will also discuss and define the use cases for a given mobile application. The reader will walk away with the understanding of why and how a threat model is important in order to identify things such as the application's purpose and industry. We will cover:

  • How to build a threat model around a mobile application
  • How to build attack paths and attack trees for a given threat model

One thing we can learn from past and current trends is that it is not ...

Get Mobile Application Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.