Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Table of Contents
Part I: Getting Started
Chapter 1: Dive In and Threat Model!
Learning to Threat Model
Threat Modeling on Your Own
Checklists for Diving In and Threat Modeling
Summary
Chapter 2: Strategies for Threat Modeling
“What's Your Threat Model?”
Brainstorming Your Threats
Structured Approaches to Threat Modeling
Models of Software
Summary
Part II: Finding Threats
Chapter 3: STRIDE
Understanding STRIDE and Why It's Useful
Spoofing Threats
Tampering Threats
Repudiation Threats
Information Disclosure Threats
Denial-of-Service Threats
Elevation of Privilege Threats
Extended Example: STRIDE Threats against Acme-DB
STRIDE Variants
Exit Criteria
Summary
Chapter 4: Attack Trees
Working with Attack Trees
Representing a Tree
Example Attack Tree
Real Attack Trees
Perspective on Attack Trees
Summary
Chapter 5: Attack Libraries
Properties of Attack Libraries
CAPEC
OWASP Top Ten
Summary
Chapter 6: Privacy Tools
Solove's Taxonomy of Privacy
Privacy Considerations for Internet Protocols
Privacy Impact Assessments (PIA)
The Nymity Slider and the Privacy Ratchet
Contextual Integrity
LINDDUN
Summary
Part III: Managing and Addressing Threats
Chapter 7: Processing and Managing Threats
Starting the Threat Modeling Project
Digging Deeper into Mitigations
Tracking with Tables and Lists
Scenario-Specific Elements of Threat Modeling
Summary
Chapter 8: Defensive Tactics and Technologies
Tactics and Technologies for Mitigating Threats
Addressing Threats with Patterns
Mitigating Privacy Threats
Summary
Chapter 9: Trade-Offs When Addressing Threats
Classic Strategies for Risk Management
Selecting Mitigations for Risk Management
Threat-Specific Prioritization Approaches
Mitigation via Risk Acceptance
Arms Races in Mitigation Strategies
Summary
Chapter 10: Validating That Threats Are Addressed
Testing Threat Mitigations
Checking Code You Acquire
QA'ing Threat Modeling
Process Aspects of Addressing Threats
Tables and Lists
Summary
Chapter 11: Threat Modeling Tools
Generally Useful Tools
Open-Source Tools
Commercial Tools
Tools That Don't Exist Yet
Summary
Part IV: Threat Modeling in Technologies and Tricky Areas
Chapter 12: Requirements Cookbook
Why a “Cookbook”?
The Interplay of Requirements, Threats, and Mitigations
Business Requirements
Prevent/Detect/Respond as a Frame for Requirements
People/Process/Technology as a Frame for Requirements
Development Requirements vs. Acquisition Requirements
Compliance-Driven Requirements
Privacy Requirements
The STRIDE Requirements
Non-Requirements
Summary
Chapter 13: Web and Cloud Threats
Web Threats
Cloud Tenant Threats
Cloud Provider Threats
Mobile Threats
Summary
Chapter 14: Accounts and Identity
Account Life Cycles
Authentication
Account Recovery
Names, IDs, and SSNs
Summary
Chapter 15: Human Factors and Usability
Models of People
Models of Software Scenarios
Threat Elicitation Techniques
Tools and Techniques for Addressing Human Factors
User Interface Tools and Techniques
Testing for Human Factors
Perspective on Usability and Ceremonies
Summary
Chapter 16: Threats to Cryptosystems
Cryptographic Primitives
Classic Threat Actors
Attacks Against Cryptosystems
Building with Crypto
Things to Remember About Crypto
Secret Systems: Kerckhoffs and His Principles
Summary
Part IV: Threat Modeling in Technologies and Tricky Areas
Chapter 17: Bringing Threat Modeling to Your Organization
How To Introduce Threat Modeling
Who Does What?
Threat Modeling within a Development Life Cycle
Overcoming Objections to Threat Modeling
Summary
Chapter 18: Experimental Approaches
Looking in the Seams
Operational Threat Models
The “Broad Street” Taxonomy
Adversarial Machine Learning
Threat Modeling a Business
Threats to Threat Modeling Approaches
How to Experiment
Summary
Chapter 19: Architecting for Success
Understanding Flow
Knowing the Participants
Boundary Objects
The Best Is the Enemy of the Good
Closing Perspectives
Summary
Appendix A: Helpful Tools
Common Answers to “What's Your Threat Model?”
Assets
Appendix B: Threat Trees
STRIDE Threat Trees
Other Threat Trees
Appendix C: Attacker Lists
Attacker Lists
Personas and Archetypes
Aucsmith's Attacker Personas
Background and Definitions
Personas
Appendix D: Elevation of Privilege: The Cards
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of Privilege (EoP)
Appendix E: Case Studies
The Acme Database
Acme's Operational Network
Phones and One-Time Token Authenticators
Sample for You to Model
Glossary
Bibliography
Introduction
What Is Threat Modeling?
Reasons to Threat Model
Who Should Read This book?
What You Will Gain from This Book
How To Use This Book
New Lessons on Threat Modeling
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →