LIST OF FIGURES
1.1 | Relating Environmental Factors to Attacks |
1.2 | Developing Metrics in Threat Modeling |
1.3 | Development Factors Affecting Scalability |
1.4 | Cyber Crime Motives |
1.5 | Simple Data Flow Diagram supporting Threat Model |
1.6 | More Evolved Data Flow Diagram supporting Threat Model |
1.7 | STRIDE Threat Classification Visual Example |
1.8 | Incorporating Vulnerabilities within the Threat Model |
1.9 | Vulnerability Mapping |
1.10 | Sample Attack Tree |
1.11 | Deriving Risk via the Application Threat Model |
2.1 | Example of Use Case Diagram 1 |
2.2 | Manual and Automated Vulnerability Assessments |
2.3 | Example of Data Flow Diagram |
2.4 | Root Causes versus Symptoms |
3.1 | Essential Process Areas for Threat Modeling |
3.2 | Security Areas for Greater Unity via Threat Modeling |
3.3 | Process Overview of Vulnerability Assessment Integration to Threat Modeling |
3.4 | Building Security Process in System/Network Administration from Threat Modeling |
3.5 | Security Centric DFD for Distributed Attacks |
3.6 | Components Represented by DREAD Risk Model |
3.7 | Stages of PASTA Threat Modeling Methodology |
3.8 | Cone of Fire Encompassing Multiple Targets |
3.9 | Relationship among Assets, Use Cases, Actors in Application Decomposition |
3.10 | Interrelated Asset Variables within an Application Environment |
3.11 | Factors Influencing Attacks |
4.1 | Threat Tree |
4.2 | Use and Misuse Case of User Log-on |
4.3 | Sketched Architectural Diagram |
4.4 | Data Flow Diagram |
4.5 | Mapping Threats Vulnerabilities and Countermeasures |
4.6 | RUP SDLC |
Get Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.