Threat modeling has become one of the top security analysis methodologies that Microsoft's developers use to identify risks and make better design, coding, and testing decisions. This book provides a clear, concise explanation of the threat-modeling process, describing a structured approach you can use to assess the security vulnerabilities for any application, regardless of platform. Software designers and developers discover how to use threat modeling during the specification phase of a new project or a major revision-from verifying application architecture to identifying and evaluating threats and designing countermeasures. Test engineers discover how to apply threat-modeling principles when creating test plans to verify results. It's the essential, high-level reference for software professionals responsible for designing, refining, and maximizing the security features in their application architecture.
- Paperback | 280 pages
- 184 x 228 x 24mm | 340.2g
- 14 Jul 2004
- Microsoft Press,U.S.
- Redmond, United States
- 1, black & white illustrations
Table of contents
Introduction Why threat modeling How an adversary sees an application Modeling the application The threat profile Choosing what to model Testing based on a threat model Making threat modeling work
About Window Snyder
Frank Swiderski is a Software Security Engineer at Microsoft(R) and is responsible for helping Microsoft product teams evaluate the impact of threats to their product or component. He has specialized in application security for several years, including serving as a managing security architect for @stake, a leading digital security consulting firm.Window Snyder is a program manager for the Microsoft(R) Secure Windows(R) Initiative Team. She is the former director of Security Architecture for @stake, and has dedicated eight years to the security industry as a consultant and as a software engineer.