Risk centric threat modeling: process for attack simulation and threat analysis (Record no. 1789)

MARC details
000 -LEADER
fixed length control field 02729nam a2200229 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250804120711.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250804b2015|||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781118988367
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.4038
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name UcedaVelez, Tony
Relator term Author
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Morana, Marco M.
Relator term Co-Author
245 ## - TITLE STATEMENT
Title Risk centric threat modeling: process for attack simulation and threat analysis
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Jersey:
Name of publisher Wiley Data and Cybersecurity,
Year of publication 2015.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxvi, 664p.
500 ## - GENERAL NOTE
General note This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns. <br/><br/>This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat modeling and risk management is the focus of Chapter 5. Chapter 6 and Chapter 7 examine Process for Attack Simulation and Threat Analysis (PASTA). Finally, Chapter 8 shows how to use the PASTA risk-centric threat modeling process to analyze the risks of specific threat agents targeting web applications. This chapter focuses specifically on the web application assets that include customer’s confidential data and business critical functionality that the web application provides.<br/><br/>• Provides a detailed walkthrough of the PASTA methodology alongside software development activities, normally conducted via a standard SDLC process<br/><br/>• Offers precise steps to take when combating threats to businesses<br/><br/>• Examines real-life data breach incidents and lessons for risk management<br/><br/>Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis is a resource for software developers, architects, technical risk managers, and seasoned security professionals.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Threat Modeling within the SDLC
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Threat Modeling and Risk Management
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Existing Threat Modeling Approaches
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=9820792
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Coded location qualifier Full call number Accession Number Koha item type
        Dr. S. R. Ranganathan Library Dr. S. R. Ranganathan Library Ebook (Online Access) --- 658.4038 EB0213 e-Books

Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha