Threat Modeling Gameplay with EoP : A reference manual for spotting threats in software architecture

Enregistré dans:
Détails bibliographiques
Auteur principal: Crawley, Brett. (Auteur)
Autres auteurs: Shostack, Adam. (Préface)
Support: E-Book
Langue: Anglais
Publié: Birmingham : Packt Publishing.
Autres localisations: Voir dans le Sudoc
Résumé: Work with over 150 real-world examples of threat manifestation in software development and identify similar design flaws in your systems using the EoP game, along with actionable solutions. Key Features: Apply threat modeling principles effectively with step-by-step instructions and support material ; Explore practical strategies and solutions to address identified threats, and bolster the security of your software systems ; Develop the ability to recognize various types of threats and vulnerabilities within software systems ; Purchase of the print or Kindle book includes a free PDF eBook. Book Description: Are you looking to navigate security risks, but want to make your learning experience fun? Here's a comprehensive guide that introduces the concept of play to protect, helping you discover the threats that could affect your software design via gameplay. Each chapter in this book covers a suit in the Elevation of Privilege (EoP) card deck (a threat category), providing example threats, references, and suggested mitigations for each card. You'll explore the methodology for threat modeling - Spoofing, Tampering, Repudiation, Information Disclosure, and Elevation of Privilege (S.T.R.I.D.E.) with Privacy deck and the T.R.I.M. extension pack. T.R.I.M. is a framework for privacy that stands for Transfer, Retention/Removal, Inference, and Minimization. Throughout the book, you'll learn the meanings of these terms and how they should be applied. From spotting vulnerabilities to implementing practical solutions, the chapters provide actionable strategies for fortifying the security of software systems. By the end of this book, you will be able to recognize threats, understand privacy regulations, access references for further exploration, and get familiarized with techniques to protect against these threats and minimize risks. What you will learn: Understand the Elevation of Privilege card game mechanics ; Get to grips with the S.T.R.I.D.E. threat modeling methodology ; Explore the Privacy and T.R.I.M. extensions to the game ; Identify threat manifestations described in the games ; Implement robust security measures to defend against the identified threats ; Comprehend key points of privacy frameworks, such as GDPR to ensure compliance. Who this book is for: This book serves as both a reference and support material for security professionals and privacy engineers, aiding in facilitation or participation in threat modeling sessions. It is also a valuable resource for software engineers, architects, and product managers, providing concrete examples of threats to enhance threat modeling and develop more secure software designs. Furthermore, it is suitable for students and engineers aspiring to pursue a career in application security. Familiarity with general IT concepts and business processes is expected
Accès en ligne: Accès à l'E-book
LEADER 04492nmm a2200445 i 4500
001 ebook-280850719
005 20241014161331.0
007 cu|uuu---uuuuu
008 241014s2024||||uk ||||g|||| ||||||eng d
020 |a 9781835089156 
035 |a FRCYB88958291 
035 |a FRCYB26088958291 
035 |a FRCYB19188958291 
035 |a FRCYB24788958291 
035 |a FRCYB24888958291 
035 |a FRCYB29388958291 
035 |a FRCYB084688958291 
035 |a FRCYB087588958291 
035 |a FRCYB56788958291 
035 |a FRCYB097088958291 
035 |a FRCYB087088958291 
040 |a ABES  |b fre  |e AFNOR 
041 0 |a eng  |2 639-2 
100 1 |a Crawley, Brett.  |4 aut.  |e Auteur 
245 1 0 |a Threat Modeling Gameplay with EoP :  |b A reference manual for spotting threats in software architecture   |c Brett Crawley ; [Foreword by Adam Shostack]. 
264 1 |a Birmingham :  |b Packt Publishing. 
264 2 |a Paris :  |b Cyberlibris,  |c 2024. 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
337 |b b  |2 isbdmedia 
338 |b ceb  |2 RDAfrCarrier 
500 |a Couverture (https://static2.cyberlibris.com/books_upload/136pix/9781835089156.jpg). 
506 |a L'accès en ligne est réservé aux établissements ou bibliothèques ayant souscrit l'abonnement  |e Cyberlibris 
520 |a Work with over 150 real-world examples of threat manifestation in software development and identify similar design flaws in your systems using the EoP game, along with actionable solutions. Key Features: Apply threat modeling principles effectively with step-by-step instructions and support material ; Explore practical strategies and solutions to address identified threats, and bolster the security of your software systems ; Develop the ability to recognize various types of threats and vulnerabilities within software systems ; Purchase of the print or Kindle book includes a free PDF eBook. Book Description: Are you looking to navigate security risks, but want to make your learning experience fun? Here's a comprehensive guide that introduces the concept of play to protect, helping you discover the threats that could affect your software design via gameplay. Each chapter in this book covers a suit in the Elevation of Privilege (EoP) card deck (a threat category), providing example threats, references, and suggested mitigations for each card. You'll explore the methodology for threat modeling - Spoofing, Tampering, Repudiation, Information Disclosure, and Elevation of Privilege (S.T.R.I.D.E.) with Privacy deck and the T.R.I.M. extension pack. T.R.I.M. is a framework for privacy that stands for Transfer, Retention/Removal, Inference, and Minimization. Throughout the book, you'll learn the meanings of these terms and how they should be applied. From spotting vulnerabilities to implementing practical solutions, the chapters provide actionable strategies for fortifying the security of software systems. By the end of this book, you will be able to recognize threats, understand privacy regulations, access references for further exploration, and get familiarized with techniques to protect against these threats and minimize risks. What you will learn: Understand the Elevation of Privilege card game mechanics ; Get to grips with the S.T.R.I.D.E. threat modeling methodology ; Explore the Privacy and T.R.I.M. extensions to the game ; Identify threat manifestations described in the games ; Implement robust security measures to defend against the identified threats ; Comprehend key points of privacy frameworks, such as GDPR to ensure compliance. Who this book is for: This book serves as both a reference and support material for security professionals and privacy engineers, aiding in facilitation or participation in threat modeling sessions. It is also a valuable resource for software engineers, architects, and product managers, providing concrete examples of threats to enhance threat modeling and develop more secure software designs. Furthermore, it is suitable for students and engineers aspiring to pursue a career in application security. Familiarity with general IT concepts and business processes is expected 
700 1 |0 (IdRef)132303248  |1 http://www.idref.fr/132303248/id  |a Shostack, Adam.  |4 aui.  |e Préface 
856 |q HTML  |u https://srvext.uco.fr/login?url=https://univ.scholarvox.com/book/88958291  |w Données éditeur  |z Accès à l'E-book 
886 2 |2 unimarc  |a 181  |a i#  |b xxxe## 
993 |a E-Book  
994 |a BNUM 
995 |a 280850719