×


 x 

Shopping cart
Tony Ucedavelez - Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis - 9780470500965 - V9780470500965
Stock image for illustration purposes only - book cover, edition or condition may vary.

Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis

€ 151.59
FREE Delivery in Ireland
Description for Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis Hardcover. This book educates readers on how to apply application threat modeling as a more advanced preventive form of security, describing countermeasures to security threats. Num Pages: 696 pages. BIC Classification: JKV; TJ; UT. Category: (P) Professional & Vocational. Dimension: 164 x 257 x 41. Weight in Grams: 1074.

This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns.  

This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat modeling and risk management is the focus of Chapter 5.  Chapter 6 and Chapter 7 examine Process for Attack Simulation and Threat Analysis (PASTA). Finally, Chapter 8 shows how to use the PASTA risk-centric threat modeling process to analyze the risks of specific threat agents targeting web applications. This chapter focuses specifically on the web application assets that include customer’s confidential data and business critical functionality that the web application provides.

• Provides a detailed walkthrough of the PASTA methodology alongside software development activities, normally conducted via a standard SDLC process

• Offers precise steps to take when combating threats to businesses

• Examines real-life data breach incidents and lessons for risk management

Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis is a resource for software developers, architects, technical risk managers, and seasoned security professionals. 

Product Details

Format
Hardback
Publication date
2015
Publisher
John Wiley & Sons Inc United Kingdom
Number of pages
450
Condition
New
Number of Pages
696
Place of Publication
New York, United States
ISBN
9780470500965
SKU
V9780470500965
Shipping Time
Usually ships in 7 to 11 working days
Ref
99-50

About Tony Ucedavelez
Tony UcedaVélez is CEO at VerSprite, an Atlanta based security services firm assisting global MNCs on various areas of cyber security, secure software development, threat modeling and security risk management. Tony has worked and led teams in the areas of application security, penetration testing, security architecture, and technical risk management for various organizations in Utility, Banking, Government, Retail, Healthcare, and Information Services. Marco M Morana serves as Senior Vice President-Application Security Architect for CitiGroup, where he is responsible for managing the architecture risk analysis and threat modeling program globally and leads global initiatives to mitigate risks of emerging cyber-threats targeting web applications of institutional clients. Marco has designed and developed business critical security software products for several Fortune 500 companies, and also for NASA.    

Reviews for Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis

Goodreads reviews for Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis


Subscribe to our newsletter

News on special offers, signed editions & more!