Threat Modeling: Designing for Security (2014)

Threat Modeling: Designing for Security (2014)

Part I. Getting Started

Chapter 1. Dive In and Threat Model!

Chapter 2. Strategies for Threat Modeling

Part II. Finding Threats

Chapter 3. STRIDE

Chapter 4. Attack Trees

Chapter 5. Attack Libraries

Chapter 6. Privacy Tools

Part III. Managing and Addressing Threats

Chapter 7. Processing and Managing Threats

Chapter 8. Defensive Tactics and Technologies

Chapter 9. Trade-Offs When Addressing Threats

Chapter 10. Validating That Threats Are Addressed

Chapter 11. Threat Modeling Tools

Part IV. Threat Modeling in Technologies and Tricky Areas

Chapter 12. Requirements Cookbook

Chapter 13. Web and Cloud Threats

Chapter 14. Accounts and Identity

Chapter 15. Human Factors and Usability

Chapter 16. Threats to Cryptosystems

Part V. Taking It to the Next Level

Chapter 17. Bringing Threat Modeling to Your Organization

Chapter 18. Experimental Approaches

Chapter 19. Architecting for Success

Appendix A. Helpful Tools

Appendix B. Threat Trees

Appendix C. Attacker Lists

Appendix D. Elevation of Privilege: The Cards

Appendix E. Case Studies

Glossary

Bibliography

Introduction