The nation's protection relies on how it has been modeled to protect itself from probable threats.
In this chapter, we will discuss some basic principles of threat modeling a mobile application and how it can benefit the organization. We will also discuss and define the use cases for a given mobile application. The reader will walk away with the understanding of why and how a threat model is important in order to identify things such as the application's purpose and industry. We will cover:
How to build a threat model around a mobile application
How to build attack paths and attack trees for a given threat model
One thing we can learn from past and current trends is that it is not possible to provide a 100% secure application against all attackers.
Before we go ahead and understand how to create a model, we need to understand the basic terms that are crucial to defining a threat model. We will go ahead and discuss the terms that...