Who this book is for
The book is for the different participants involved in threat modeling:
- Security professionals and privacy engineers can use the book as a reference and support material when either facilitating or participating in threat modeling with teams.
- Software engineers and software architects can use the book when threat-modeling their software design. It supports them with concrete examples of threats so that they will then know what to look for and how it should be mitigated in their design, and they’ll be in a position to create better threat models and, above all, more secure software.
- Product managers who need to threat-model their product with the team and support them by giving additional context they may have can use the book.
- Students and engineers wanting to move into the application security space as a career choice can use the book to support them in their studies.