-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Threat Modeling Best Practices
By :
This example follows a fictitious company named Centurion Bank & Trust, a financial institution implementing a new online banking system. This demonstrates how systematic security analysis can help the bank identify critical assets, as well as how they can define relevant threat agents, including external cybercriminals and insider threats. This example will show how a structured approach to threat modeling helps organizations achieve improvements in their security posture through application threat modeling.
The fictional bank Centurion Bank & Trust, a leading financial institution, decided to implement a new online banking system to enhance customer experience and streamline operations. The system allows customers to perform transactions, check account balances, and apply for loans through a web interface.
Identify potential security threats and vulnerabilities in the new online banking...
Change the font size
Change margin width
Change background colour