Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Threat Modeling Gameplay with EoP

You're reading from   Threat Modeling Gameplay with EoP A reference manual for spotting threats in software architecture

Arrow left icon
Product type Paperback
Published in Aug 2024
Publisher Packt
ISBN-13 9781804618974
Length 256 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Brett Crawley Brett Crawley
Author Profile Icon Brett Crawley
Brett Crawley
Arrow right icon
View More author details
Toc

Table of Contents (18) Chapters Close

Preface 1. Chapter 1: Game Play FREE CHAPTER 2. Chapter 2: Spoofing 3. Chapter 3: Tampering 4. Chapter 4: Repudiation 5. Chapter 5: Information Disclosure 6. Chapter 6: Denial of Service 7. Chapter 7: Elevation of Privilege 8. Chapter 8: Privacy 9. Chapter 9: Transfer 10. Chapter 10: Retention/Removal 11. Chapter 11: Inference 12. Chapter 12: Minimization 13. Glossary
14. Further Reading 15. Licenses for third party content 16. Index 17. Other Books You May Enjoy

What this book covers

Chapter 1, Game Play, explores how the game is played, who should play, what you’ll need, and resources that you may find useful (in addition to this book, obviously).

Chapter 2, Spoofing, covers example spoofing threats, suggested mitigations for each of those threats, as well as references, where you can get additional background on a threat and its potential mitigations.

Chapter 3, Tampering, discusses example tampering threats, suggests mitigations for each of those threats, as well as references, where you can get additional background on a threat and its potential mitigations. (You should start to see a theme here.)

Chapter 4, Repudiation, dives into example repudiation threats, suggests mitigations for each of those threats, as well as references, where you can get additional background on a threat and its potential mitigations.

Chapter 5, Information Disclosure, examines example information disclosure threats, suggests mitigations for each of those threats, as well as references, where you can get additional background on a threat and its potential mitigations.

Chapter 6, Denial of Service, explores example privacy threats from elevation of privilege with privacy, suggests mitigations for each of those threats, as well as references, where you can get additional background on a threat and its potential mitigations.

Chapter 7, Elevation of Privilege, covers example elevations of privilege threats from the Elevation of Privilege suit, suggests mitigations for each of those threats, as well as references, where you can get additional background on a threat and its potential mitigations.

Chapter 8, Privacy, discusses example denial-of-service threats, suggests mitigations for each of those threats, as well as references, where you can get additional background on a threat and its potential mitigations.

Chapter 9, Transfer, dives into example transfer threats from the TRIM extension, suggests mitigations for each of those threats, as well as references, where you can get additional background on a threat and its potential mitigations.

Chapter 10, Retention/Removal, examines example retention/removal threats from the TRIM extension, suggests mitigations for each of those threats, as well as references, where you can get additional background for a threat and its potential mitigations.

Chapter 11, Inference, explores example inference threats from the TRIM extension, suggests mitigations for each of those threats, as well as references, where you can get additional background on a threat and its potential mitigations.

Chapter 12, Minimization, covers example minimization threats from the TRIM extension, suggests mitigations for each of those threats, as well as references, where you can get additional background on a threat and its potential mitigations.

Glossary offers a glossary of terms.

Appendix offers references for further reading.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image