Détail de l'auteur
Auteur Tony Uceda Vélez |
Documents disponibles écrits par cet auteur (1)
Ajouter le résultat dans votre panier Faire une suggestion Affiner la recherche
Titre : Risk centric threat modeling : process for attack simulation and threat analysis Type de document : texte imprimé Auteurs : Tony Uceda Vélez, Auteur ; Marco M. Morana, Auteur Editeur : Hoboken ; New Jeresy : Wiley Année de publication : 2015 Importance : XXV, 664 p. Présentation : ill. Format : 24 cm ISBN/ISSN/EAN : 978-0-470-50096-5 Note générale : Ref. Bibliogr. - Index Langues : Anglais (eng) Mots-clés : Data protection
Computer security
Management information systems -- Security measures
Computer networks -- Security measures
Risk assessment
Protection de l'information (Informatique)
Sécurité informatique
Systèmes d'information de gestion -- Sécurité -- Mesures
Réseaux d'ordinateurs -- Sécurité -- Mesures
Évaluation du risqueIndex. décimale : 004.056 Sécurité Résumé : This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns.
This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat mode...Note de contenu : Summary :
1. Threat Modeling Overview
2. Objectives and Benefits of Threat Modeling
3. Existing Threat Modeling Approaches
4. Threat Modeling Within the SDLC
5. Threat Modeling and Risk Management
6. Intro to PASTA
7. Diving Deeper into PASTA
8. PASTA Use CaseRisk centric threat modeling : process for attack simulation and threat analysis [texte imprimé] / Tony Uceda Vélez, Auteur ; Marco M. Morana, Auteur . - Hoboken ; New Jeresy : Wiley, 2015 . - XXV, 664 p. : ill. ; 24 cm.
ISBN : 978-0-470-50096-5
Ref. Bibliogr. - Index
Langues : Anglais (eng)
Mots-clés : Data protection
Computer security
Management information systems -- Security measures
Computer networks -- Security measures
Risk assessment
Protection de l'information (Informatique)
Sécurité informatique
Systèmes d'information de gestion -- Sécurité -- Mesures
Réseaux d'ordinateurs -- Sécurité -- Mesures
Évaluation du risqueIndex. décimale : 004.056 Sécurité Résumé : This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns.
This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat mode...Note de contenu : Summary :
1. Threat Modeling Overview
2. Objectives and Benefits of Threat Modeling
3. Existing Threat Modeling Approaches
4. Threat Modeling Within the SDLC
5. Threat Modeling and Risk Management
6. Intro to PASTA
7. Diving Deeper into PASTA
8. PASTA Use CaseRéservation
Réserver ce document
Exemplaires (2)
Code-barres Cote Support Localisation Section Disponibilité Etat_Exemplaire 061417 004.056 UCE Papier Bibliothèque Centrale Informatique Disponible En bon état 061418 004.056 UCE Papier Bibliothèque Centrale Informatique Disponible Consultation sur place


