LIST OF FIGURES

1.1Relating Environmental Factors to Attacks
1.2Developing Metrics in Threat Modeling
1.3Development Factors Affecting Scalability
1.4Cyber Crime Motives
1.5Simple Data Flow Diagram supporting Threat Model
1.6More Evolved Data Flow Diagram supporting Threat Model
1.7STRIDE Threat Classification Visual Example
1.8Incorporating Vulnerabilities within the Threat Model
1.9Vulnerability Mapping
1.10Sample Attack Tree
1.11Deriving Risk via the Application Threat Model
2.1Example of Use Case Diagram 1
2.2Manual and Automated Vulnerability Assessments
2.3Example of Data Flow Diagram
2.4Root Causes versus Symptoms
3.1Essential Process Areas for Threat Modeling
3.2Security Areas for Greater Unity via Threat Modeling
3.3Process Overview of Vulnerability Assessment Integration to Threat Modeling
3.4Building Security Process in System/Network Administration from Threat Modeling
3.5Security Centric DFD for Distributed Attacks
3.6Components Represented by DREAD Risk Model
3.7Stages of PASTA Threat Modeling Methodology
3.8Cone of Fire Encompassing Multiple Targets
3.9Relationship among Assets, Use Cases, Actors in Application Decomposition
3.10Interrelated Asset Variables within an Application Environment
3.11Factors Influencing Attacks
4.1Threat Tree
4.2Use and Misuse Case of User Log-on
4.3Sketched Architectural Diagram
4.4Data Flow Diagram
4.5Mapping Threats Vulnerabilities and Countermeasures
4.6RUP SDLC

Get Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.