Universal Book Ratings
#499,744 in Books (See Top 100 in Books)
#1,602 in Software Design & Development
#1,611 in Computing & Internet for Professionals
#499,744 in Web Administration
Computing & Internet      Programming

Threat Modeling Gameplay with EoP: A reference manual for spotting threats in software architecture

(0 reviews)
Paper Back
£47.58
£44.34
Condition
Quantity
(1030 available)
Share
Book Details
Language
English
Publishers
Packt Publishing (9 Aug. 2024)
Weight
0.45 KG
Publication Date
09/08/2024
ISBN-10
1804618977
Pages
256 pages
ISBN-13
9781804618974
Dimensions
1.6 x 19.05 x 23.5 cm
SKU
9781804618974
Author Name
Brett Crawley (Author)
Brett is a Principal Application Security Engineer, (ISC)² CISSP, CSSLP, and CCSP certified, the author of Threat Modeling Gameplay with EoP, the project lead on the OWASP Application Security Awareness Campaigns project, and the author of the ostering {osteria, running} blog on security. He’s published a Miro template for threat modeling with the Elevation of Privilege card game, the CAPEC S.T.R.I.D.E. mapping mind maps, and other resources.With over 10 years of application security experience and over 25 years of software engineering experience, he’s worked with teams to define their security best practices and introduce security by design into their existing SDLC. As part of this initiative, he’s trained teams in threat modeling because he believes good design is of key importance.In his spare time, he enjoys sport, is a keen gardener, cook and a photographer amongst all his other hobbies.Read more about this authorRead less about this author
Read More

Reviews & Ratings

5 out of 5.0
(0 reviews)
There have been no reviews for this product yet.
Work with over 150 real-world examples of threat manifestation in software development and identify similar design flaws in your systems using the EoP game, along with actionable solutionsKey FeaturesApply threat modeling principles effectively with step-by-step instructions and support materialExplore practical strategies and solutions to address identified threats, and bolster the security of your software systemsDevelop the ability to recognize various types of threats and vulnerabilities within software systemsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionAre you looking to navigate security risks, but want to make your learning experience fun? Here's a comprehensive guide that introduces the concept of play to protect, helping you discover the threats that could affect your software design via gameplay. Each chapter in this book covers a suit in the Elevation of Privilege (EoP) card deck (a threat category), providing example threats, references, and suggested mitigations for each card.

You’ll explore the methodology for threat modeling—Spoofing, Tampering, Repudiation, Information Disclosure, and Elevation of Privilege (S. T.

R. I.

D. E.

) with Privacy deck and the T. R.

I. M.

extension pack. T.

R. I.

M. is a framework for privacy that stands for Transfer, Retention/Removal, Inference, and Minimization.

Throughout the book, you’ll learn the meanings of these terms and how they should be applied. From spotting vulnerabilities to implementing practical solutions, the chapters provide actionable strategies for fortifying the security of software systems.

By the end of this book, you will be able to recognize threats, understand privacy regulations, access references for further exploration, and get familiarized with techniques to protect against these threats and minimize risks. What you will learnUnderstand the Elevation of Privilege card game mechanicsGet to grips with the S.

T. R.

I. D.

E. threat modeling methodologyExplore the Privacy and T.

R. I.

M. extensions to the gameIdentify threat manifestations described in the gamesImplement robust security measures to defend against the identified threatsComprehend key points of privacy frameworks, such as GDPR to ensure complianceWho this book is forThis book serves as both a reference and support material for security professionals and privacy engineers, aiding in facilitation or participation in threat modeling sessions.

It is also a valuable resource for software engineers, architects, and product managers, providing concrete examples of threats to enhance threat modeling and develop more secure software designs. Furthermore, it is suitable for students and engineers aspiring to pursue a career in application security.

Familiarity with general IT concepts and business processes is expected. Table of ContentsGame PlaySpoofingTamperingRepudiationInformation DisclosureDenial of Service Elevation of PrivilegePrivacyTransferRetention/RemovalInferenceMinimizationGlossaryFurther Reading.

Frequently Bought Products

Product Queries (0)

Login Or Registerto submit your questions to seller

Other Questions

No none asked to seller yet

Bookiyos Books Solutions - Quality Books, Unbeatable Prices

Bookiyos Books Solutions is your premier online bookstore offering a vast selection of over 5 crore books. Whether you're looking for the latest releases, timeless classics, or rare finds, we have something for every reader. Our platform serves customers worldwide, including the USA, UK, and Europe, with fast delivery and easy return policies to ensure a hassle-free shopping experience. Discover daily updates, exclusive deals, and a comprehensive collection of books that cater to all your reading needs. Shop with confidence at Bookiyos, where quality books and unbeatable prices meet.

Why Choose Bookiyos?

Extensive Inventory: New, old, and rare books available.
Fast Delivery: Same or next-day shipping.
Easy Returns: Hassle-free refund and return policies.
Global Reach: Serving customers in the USA, UK, Europe, and beyond.
Daily Updates: Thousands of new titles added every day.
Join our community of book lovers and start your literary journey with Bookiyos Books Solutions today!