Threat Modeling

Course

Online

Price on request

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Threat modeling is the methodology used by Microsoft's security experts to identify security risks, verify an application's security architecture, and develop countermeasures in the design, coding, and testing phases. This book is the first to cover this subject in-depth.               

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • IT
  • Security
  • IT Security
  • Testing
  • Design

Course programme

Description
Threat modeling is the methodology used by Microsoft's security experts to identify security risks, verify an application's security architecture, and develop countermeasures in the design, coding, and testing phases. This book is the first to cover this subject in-depth.

Program

Threat modeling is the methodology used by Microsoft's security experts to identify security risks, verify an application's security architecture, and develop countermeasures in the design, coding, and testing phases. This book is the first to cover this subject in-depth.


In this straightforward and practical guide, Microsoft application security specialists Frank Swiderski and Window Snyder describe the concepts and goals for threat modeling-a structured approach for identifying, evaluating, and mitigating risks to system security.


Discover how to use the threat modeling methodology to analyze your system from the adversary's point of view-creating a set of data points that help drive security specifications and testing. You'll review application scenarios that illustrate threat modeling concepts in action, understanding how to use threat modeling to help improve the built-in security of a system-as well as your customer's confidence in the security of that system-regardless of development environment.


Gain an in-depth, conceptual understanding-along with practical ways to integrate threat modeling into your development efforts:


  • Help anticipate attacks by seeing how adversaries assess your system-and compare their view to the developer's or architect's view.
  • Employ a data flow approach to create a threat profile for a system
  • Reveal vulnerabilities in system architecture and implementation using investigative techniques such as threat trees and threat model-directed code reviews.
  • Develop a credible security characterization for modeling threats.
  • Use threat modeling to help verify security features and increase the resilience of software systems.
  • Increase customer confidence in your products!
Authors: Frank Swiderski and Window Snyder
Publisher: Microsoft Press
ISBN 10: 0735619913
ISBN 13: 9780735619913
Pages: 288
Format: Soft Cover
Published Date: 16/06/2004
Availability: Ex Stock

Threat Modeling

Price on request