LIST OF TABLES

1.1Correlating Environmental Factors to Attack Motives – SAMPLE
1.2Correlating Motives to Application Threat Vectors
1.3Recommended Frequency for Environmental Threat Factor Analysis
1.4Key Reasons App_Sec Fails Today
1.5Threat Modeling Benefits for Various Roles
1.6Threat Model Stack
1.7Taxonomy of Attack Terms
1.8Tools for Testing
1.9Elements of Risk – Generic Listing of Key Risk Components
2.1Application Security Roles, Responsibilities, and Benefits
2.2Example of Threats and the Technical and Business Impacts
2.3Criteria for Threat Modeling Scope
2.4Criteria for Application Threat Modeling Updates
2.5Mapping of Threats to Vulnerabilities
3.1Example of Mapping Threat Modeling Efforts to Security Processes
3.2Security Experience Meets Threat Modeling
3.3Factors Affecting Time Requirements for Threat Modeling
3.4DFD Symbols (Microsoft ACE Team) (59)
3.5Traditional Network-Based Denial of Service Attacks
3.6STRIDE Threat Categorization Table (60)
3.7Example of STRIDE Classification Model
3.8Threat Rating Table Example
3.9Sample Risk Rating Exercise Using DREAD
3.10DREAD Risk Rating Applied to Sample Threat
3.11Security Objectives in support of Business Objectives
3.12Application Decomposition for Mobile J2ME App
3.13MITRE's Security Content
5.1Example of Assignment of Risks Of A Threat Event based upon probability of the event and impact on the asset
6.1Enterprise Process Mapping to PASTA Threat Modeling ...

Get Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.