-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Threat Modeling Best Practices
By :
A
address space layout randomization (ASLR) 178
advanced persistent threats (APTs) 51, 52
adversary-in-the-middle attacks 168
adversary models 160, 161
Byzantine adversary 163
Canetti-Krawczyk 162
Dolev-Yao 161, 162
honest-but-curious 163
Agentic AI 187
Agentic AI language models 189
AI 186
AI agents 186
AI winters 186
alignment fragility 197
Annualized Rate of Occurrence (ARO) 61
Annual Loss Expectancy (ALE) 61
asset categorization and prioritization, MediTech Innovations scenario 146, 147
best practice, for evaluation 33
comprehensive asset inventory, maintaining 35-37
criticality 32
protecting 32
value, assigning 34, 35
assets identification, for threat modeling 30
cloud assets 32
digital assets 31
hardware assets 30
human assets 32
network assets 32
software assets 31
Attack Flow Builder
attack path flow, creating 116
attack path...
Change the font size
Change margin width
Change background colour