-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Threat Modeling Gameplay with EoP
By :

Threat Modeling Gameplay with EoP
By:
Overview of this book
Are you looking to navigate security risks, but want to make your learning experience fun? Here's a comprehensive guide that introduces the concept of play to protect, helping you discover the threats that could affect your software design via gameplay.
Each chapter in this book covers a suit in the Elevation of Privilege (EoP) card deck (a threat category), providing example threats, references, and suggested mitigations for each card. You’ll explore the methodology for threat modeling—Spoofing, Tampering, Repudiation, Information Disclosure, and Elevation of Privilege (S.T.R.I.D.E.) with Privacy deck and the T.R.I.M. extension pack. T.R.I.M. is a framework for privacy that stands for Transfer, Retention/Removal, Inference, and Minimization. Throughout the book, you’ll learn the meanings of these terms and how they should be applied. From spotting vulnerabilities to implementing practical solutions, the chapters provide actionable strategies for fortifying the security of software systems.
By the end of this book, you will be able to recognize threats, understand privacy regulations, access references for further exploration, and get familiarized with techniques to protect against these threats and minimize risks.
Table of Contents (18 chapters)
Preface
Chapter 1: Game Play
Chapter 2: Spoofing
Chapter 3: Tampering
Chapter 4: Repudiation
Chapter 5: Information Disclosure
Chapter 6: Denial of Service
Chapter 7: Elevation of Privilege
Chapter 8: Privacy
Chapter 9: Transfer
Chapter 10: Retention/Removal
Chapter 11: Inference
Chapter 12: Minimization
Glossary
Further Reading
Index
Customer Reviews