How to perform threat modeling of software to protect your business, critical assets and communicate your message to your boss and the Board of Directors
This document discusses application threat modeling. It begins with introducing key terminology used in threat modeling like assets, threats, attacks, and risks. It then explains what threat modeling is and when it should be performed. The document outlines three main approaches to threat modeling: asset-centric, attacker-centric using attack trees, and system-centric. It provides examples of each approach and discusses how to identify threats, calculate risks, and plan countermeasures as part of the system-centric threat modeling process.
As delusions of effective risk management for application environments continue to spread, companies continue to bleed large amounts of security spending without truly knowing if the amount is warranted, effective, or even elevating security at all. In parallel, hybrid, thought-provoking security strategies are moving beyond conceptual ideas to practical applications within ripe environments. Application Threat Modeling is one of those areas that, beyond the hype, provides practical and sensible security strategy that leverages already existing security efforts for an improved threat model of what is lurking in the shadows.
Tony UcedaVelez, Managing Director
An experienced security management professional, Tony has more than 10 years of hands-on security and technology experience and is a vocal advocate of security process engineering – a term that describes the design and development of secure processes and controls working symbiotically to create a unique business workflow. Tony currently serves as Managing Director for an Atlanta based risk advisory firm that focuses on security strategy and delivering effective means for risk mitigation and security process engineering. He has worked and consulted for the Fortune 500, as well as federal agencies in the U.S. on the topic of application security and security process engineering.
Threat modeling the security of the enterpriseRafal Los
Many IT Security professionals simply do not understand "threat modeling" - or how an attack at component A can ultimately affect component B, C, and D ... this example-based (and very, very high-level) talk hopes to get you interested in threat modeling and understanding how things are connected - in orer to give you a chance to build your defenses.
Threat modeling is a way of thinking about what can go wrong and how to prevent it. Instinctively, we all think this way in regard to our own personal security and safety. When it comes to building or evaluating information systems, we need to develop a similar mindset. In this slide deck, Robert Hurlbut provides practical strategies to develop a threat modeling mindset by: understanding a system, identifying threats, identifying vulnerabilities, determining mitigations and applying the mitigations through risk management.
Why are code reviews and penetration tests not enough to secure your organization’s software? This presentation explores the importance of threat modeling in the security journey.
6 Most Popular Threat Modeling MethodologiesEC-Council
Threat modeling is one of the most effective preventive security measures, empowering cybersec professionals to put a robust cybersecurity strategy in place. So, let’s learn more about threat modeling in this SlideShare.
If you are keen to learn effective threat modeling after going through the SlideShare, click here: https://www.eccouncil.org/programs/threat-intelligence-training/
Do you know what the steps of threat modeling and various models are? Take a look at these slides to learn.
To learn more about threat modeling, visit https://www.eccouncil.org/threat-modeling/
Brad Andrews, CEO, RBA Communications
Threat Modeling Overview
This session will cover the basic elements of threat modeling, looking at what it does and why it is important. The goal is to provide a high level overview of the process and the use of things like data flow diagrams to look for trust boundaries attacks may come across. We will go through some common threats and hopefully a list of dangers to watch out for when carrying out threat modeling. The session will then work to interactively develop a flow diagram of Amazon.com and possibly another subject if we have time. This will all be based on looking at the system as a user, without any insider knowledge, though Threat Modeling is normally carried out by those who do know the system well.
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...EC-Council
This document discusses developing a robust data loss prevention strategy to thwart insider threats. It begins by noting that 64% of data loss is caused by well-meaning insiders and 50% of employees leave with data, costing companies an average of $5.4 million per breach. The document then provides definitions and an overview of data loss prevention strategies before outlining a 10-step strategy that includes identifying sensitive data owners, locating where data resides, monitoring how data is used, implementing real-time enforcement of policies, educating users, and wrapping additional security around sensitive data to prevent leaks. The goal is to safeguard organizations' most sensitive data and reputation from both unintentional and malicious insider threats.
Learn about threat modeling from our CTO and co-creator of the DREAD threat modeling classification, Jason Taylor. Understand more about what threat modeling is, dive into real life examples, and use techniques you can leverage at every phase of the SDLC.
What can go wrong?!
Thirty years of commercial information security have taught us to orchestrate perimeter controls, to correctly configure AAA systems, to evaluate risks and manage them.
But when we talk about the supply chain, the context dramatically changes and we risk realising we did not understand it all or we naively transferred our risk to an unaware third party.
The document describes a 2-day threat simulation and modeling training course offered by Tonex for $1,699. The training covers topics such as the Process for Attack Simulation and Threat Analysis (PASTA), Common Attack Pattern Enumeration and Classification (CAPEC), and using threat modeling within the Software Development Life Cycle (SDLC). Attendees will learn how to identify threats, analyze vulnerabilities, simulate attacks, and manage residual risks. The course includes lectures, workshops, labs, and case studies.
This presentation discusses the importance of threat Modeling. This presentation also discusses about different ways to perform threat modeling. This threat modeling should be done during the design phase of the application development. The main aim of the threat modeling is to identify the import assets or functionalities of the application and to protect them. Threat Modeling cuts down the cost of application development as it identifies the issues during the design phase. In this presentation we also discuss about basics of Mobile Threat Modeling. This presentation mainly concentrates on STRIDE and DREAD.
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...EC-Council
This document discusses moving away from relying solely on top security lists to define metrics and instead developing "organic metrics". It recommends starting by measuring activities aligned with your software development lifecycle processes. As the program matures, benchmarks and lists can be incorporated. Scorecards should report on internal metrics mapped to operational and financial goals rather than just security. Developing processes and metrics internally first allows contextual analysis and substantiates security initiatives across the organization. Relying only on lists does not foster developing meaningful metrics tied to the organization's needs.
To improve your (threat) modeling career, you need a better (threat) agent (library)! Threat modeling is a process for capturing, organizing, and analyzing the security of a system based on the perspective of a threat agent. Threat modeling enables informed decision-making about application security risk. In addition to producing a model, typical threat modeling efforts also produce a prioritized list of security improvements to the concept, requirements, design, or implementation. In 2009, OWASP posted wiki pages on threat modeling. Although there was the start of a section on threat agents, it has yet to be completed.
Intel developed a unique standardized threat agent library (TAL) that provides a consistent, up-to-date reference describing the human agents (AKA; threat actors) that pose threats to IT systems and other information assets. Instead of picking threat agents based on vendor recommendations and space requirements in Powerpoint, the TAL produces a repeatable, yet flexible enough for a range of risk assessment uses. We will cover both the TAL, the Threat Agent Risk Assessment (TARA), how they can be used to improve threat modeling.
Speaker
Eric Jernigan
Information Security Architect, Umpqua Bank
The document discusses approaches to building secure web applications, including establishing software security processes and maturity levels. It covers security activities like threat modeling, defining security requirements, secure coding standards, security testing, and metrics. Business cases for software security focus on reducing costs of vulnerabilities, threats to web apps, and root causes being application vulnerabilities and design flaws.
Threat modeling is a repeatable process that helps identify threats to products in order to find and mitigate risks. It is most effective when done early in the software development lifecycle. There are different approaches to threat modeling such as being attacker-centric, software-centric, or asset-centric. The process typically involves decomposing the application, determining and ranking threats, and determining mitigations. Common methods for identifying threats include STRIDE which focuses on spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privileges. The DREAD model provides a way to rate risk based on damage potential, reproducibility, exploitability, affected users, and discoverability. Threat modeling cuts costs when implemented in the
The document discusses starting a software security initiative within an organization using a maturity-based and metrics-driven approach. It recommends assessing the current maturity level, defining security standards and processes, and implementing security activities throughout the software development lifecycle (SDLC). Key metrics to track include the percentage of issues identified and fixed by lifecycle phase, average time to fix vulnerabilities, and vulnerability density.
Creating a custom Threat Modeling feedback model in an agile environment.
Youtube : https://www.youtube.com/watch?v=pXr75ufG1uM
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
In order to effectively defend your organization, you must think about the offensive strategy as well. But before we get ahead of ourselves let’s talk briefly about the building blocks of a good offense. First is an architecture that is built around a security policy that is aligned with the business risk. Risk must be understood and a cookie cutter approach must be avoided here because again every organization is different and so are their risks.
This document outlines an economic framework for cybersecurity investment. It discusses:
- Implementing baseline security controls can address 80% of threats at low cost while improving availability. However, cultural resistance exists to prioritizing "hygiene."
- A framework is proposed with four levels based on mission criticality and threat sophistication. It recommends investing first in baseline controls, then in targeted advanced controls for critical functions facing sophisticated threats.
- Additional principles are outlined for tailoring investments to threats and accepting certain risks. Portfolio approaches are suggested to structure investments across infrastructure, back office systems, and unique mission capabilities.
The document discusses technical vulnerability management and outlines the key steps in the NIST Risk Management Framework that include vulnerability analysis. It also covers establishing an effective Patch and Vulnerability Group to monitor for vulnerabilities, prioritize remediation, and deploy patches. Finally, it provides examples of different types of vulnerability analysis tools including network scanners, host scanners, and web application scanners.
The document discusses reducing security risks for small businesses through vulnerability assessments. It notes that small businesses are increasingly targeted by hackers. A vulnerability assessment includes a one-time scan of a business's security exposure across devices on its network to identify issues like out-of-date software. The assessment provides a report on findings prioritized by risk level and recommendations to remedy problems to help businesses strengthen their security before facing attacks.
Risk Analysis and Mitigation in Virtualized EnvironmentsSiddharth Coontoor
As companies move towards hybrid cloud solution there are still many private cloud solutions still out there. Traditional risk assessment techniques cannot be applied to such virtual servers. This paper is an attempt to identify key assets and assess risks related to these critical assets.
Slides for an overview lecture explaining how risk management and controls are the route to explaining why information security matters to business. Plus a bonus discussion of why incident handling is no longer optional.
Brad Andrews, CEO, RBA Communications
Threat Modeling Overview
This session will cover the basic elements of threat modeling, looking at what it does and why it is important. The goal is to provide a high level overview of the process and the use of things like data flow diagrams to look for trust boundaries attacks may come across. We will go through some common threats and hopefully a list of dangers to watch out for when carrying out threat modeling. The session will then work to interactively develop a flow diagram of Amazon.com and possibly another subject if we have time. This will all be based on looking at the system as a user, without any insider knowledge, though Threat Modeling is normally carried out by those who do know the system well.
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...EC-Council
This document discusses developing a robust data loss prevention strategy to thwart insider threats. It begins by noting that 64% of data loss is caused by well-meaning insiders and 50% of employees leave with data, costing companies an average of $5.4 million per breach. The document then provides definitions and an overview of data loss prevention strategies before outlining a 10-step strategy that includes identifying sensitive data owners, locating where data resides, monitoring how data is used, implementing real-time enforcement of policies, educating users, and wrapping additional security around sensitive data to prevent leaks. The goal is to safeguard organizations' most sensitive data and reputation from both unintentional and malicious insider threats.
Learn about threat modeling from our CTO and co-creator of the DREAD threat modeling classification, Jason Taylor. Understand more about what threat modeling is, dive into real life examples, and use techniques you can leverage at every phase of the SDLC.
What can go wrong?!
Thirty years of commercial information security have taught us to orchestrate perimeter controls, to correctly configure AAA systems, to evaluate risks and manage them.
But when we talk about the supply chain, the context dramatically changes and we risk realising we did not understand it all or we naively transferred our risk to an unaware third party.
The document describes a 2-day threat simulation and modeling training course offered by Tonex for $1,699. The training covers topics such as the Process for Attack Simulation and Threat Analysis (PASTA), Common Attack Pattern Enumeration and Classification (CAPEC), and using threat modeling within the Software Development Life Cycle (SDLC). Attendees will learn how to identify threats, analyze vulnerabilities, simulate attacks, and manage residual risks. The course includes lectures, workshops, labs, and case studies.
This presentation discusses the importance of threat Modeling. This presentation also discusses about different ways to perform threat modeling. This threat modeling should be done during the design phase of the application development. The main aim of the threat modeling is to identify the import assets or functionalities of the application and to protect them. Threat Modeling cuts down the cost of application development as it identifies the issues during the design phase. In this presentation we also discuss about basics of Mobile Threat Modeling. This presentation mainly concentrates on STRIDE and DREAD.
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...EC-Council
This document discusses moving away from relying solely on top security lists to define metrics and instead developing "organic metrics". It recommends starting by measuring activities aligned with your software development lifecycle processes. As the program matures, benchmarks and lists can be incorporated. Scorecards should report on internal metrics mapped to operational and financial goals rather than just security. Developing processes and metrics internally first allows contextual analysis and substantiates security initiatives across the organization. Relying only on lists does not foster developing meaningful metrics tied to the organization's needs.
To improve your (threat) modeling career, you need a better (threat) agent (library)! Threat modeling is a process for capturing, organizing, and analyzing the security of a system based on the perspective of a threat agent. Threat modeling enables informed decision-making about application security risk. In addition to producing a model, typical threat modeling efforts also produce a prioritized list of security improvements to the concept, requirements, design, or implementation. In 2009, OWASP posted wiki pages on threat modeling. Although there was the start of a section on threat agents, it has yet to be completed.
Intel developed a unique standardized threat agent library (TAL) that provides a consistent, up-to-date reference describing the human agents (AKA; threat actors) that pose threats to IT systems and other information assets. Instead of picking threat agents based on vendor recommendations and space requirements in Powerpoint, the TAL produces a repeatable, yet flexible enough for a range of risk assessment uses. We will cover both the TAL, the Threat Agent Risk Assessment (TARA), how they can be used to improve threat modeling.
Speaker
Eric Jernigan
Information Security Architect, Umpqua Bank
The document discusses approaches to building secure web applications, including establishing software security processes and maturity levels. It covers security activities like threat modeling, defining security requirements, secure coding standards, security testing, and metrics. Business cases for software security focus on reducing costs of vulnerabilities, threats to web apps, and root causes being application vulnerabilities and design flaws.
Threat modeling is a repeatable process that helps identify threats to products in order to find and mitigate risks. It is most effective when done early in the software development lifecycle. There are different approaches to threat modeling such as being attacker-centric, software-centric, or asset-centric. The process typically involves decomposing the application, determining and ranking threats, and determining mitigations. Common methods for identifying threats include STRIDE which focuses on spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privileges. The DREAD model provides a way to rate risk based on damage potential, reproducibility, exploitability, affected users, and discoverability. Threat modeling cuts costs when implemented in the
The document discusses starting a software security initiative within an organization using a maturity-based and metrics-driven approach. It recommends assessing the current maturity level, defining security standards and processes, and implementing security activities throughout the software development lifecycle (SDLC). Key metrics to track include the percentage of issues identified and fixed by lifecycle phase, average time to fix vulnerabilities, and vulnerability density.
Creating a custom Threat Modeling feedback model in an agile environment.
Youtube : https://www.youtube.com/watch?v=pXr75ufG1uM
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
In order to effectively defend your organization, you must think about the offensive strategy as well. But before we get ahead of ourselves let’s talk briefly about the building blocks of a good offense. First is an architecture that is built around a security policy that is aligned with the business risk. Risk must be understood and a cookie cutter approach must be avoided here because again every organization is different and so are their risks.
This document outlines an economic framework for cybersecurity investment. It discusses:
- Implementing baseline security controls can address 80% of threats at low cost while improving availability. However, cultural resistance exists to prioritizing "hygiene."
- A framework is proposed with four levels based on mission criticality and threat sophistication. It recommends investing first in baseline controls, then in targeted advanced controls for critical functions facing sophisticated threats.
- Additional principles are outlined for tailoring investments to threats and accepting certain risks. Portfolio approaches are suggested to structure investments across infrastructure, back office systems, and unique mission capabilities.
The document discusses technical vulnerability management and outlines the key steps in the NIST Risk Management Framework that include vulnerability analysis. It also covers establishing an effective Patch and Vulnerability Group to monitor for vulnerabilities, prioritize remediation, and deploy patches. Finally, it provides examples of different types of vulnerability analysis tools including network scanners, host scanners, and web application scanners.
The document discusses reducing security risks for small businesses through vulnerability assessments. It notes that small businesses are increasingly targeted by hackers. A vulnerability assessment includes a one-time scan of a business's security exposure across devices on its network to identify issues like out-of-date software. The assessment provides a report on findings prioritized by risk level and recommendations to remedy problems to help businesses strengthen their security before facing attacks.
Risk Analysis and Mitigation in Virtualized EnvironmentsSiddharth Coontoor
As companies move towards hybrid cloud solution there are still many private cloud solutions still out there. Traditional risk assessment techniques cannot be applied to such virtual servers. This paper is an attempt to identify key assets and assess risks related to these critical assets.
Slides for an overview lecture explaining how risk management and controls are the route to explaining why information security matters to business. Plus a bonus discussion of why incident handling is no longer optional.
Today’s cyber criminals are more sophisticated, more agile and more aggressive than traditional security measures can protect against. One simply needs to open a news source today to find a headline on a new breach - Office of Management Personal, Sony, Target are just a few examples of note. The increase in attacks and breaches can be attributed to a variety of factors, not the least of which include: a rise in asymmetric threats, commoditization of threats/attacks and incomplete security strategies. By incorporating cyber threat analysis in your security strategy, however, you can better counter and mitigate these threats.
Information Systems Security & StrategyTony Hauxwell
This document discusses information security strategies and the importance of protecting sensitive data. It defines an information security strategy as a set of procedures and policies to protect information assets from being lost, stolen or compromised. The core concepts of confidentiality, integrity and availability underpin security strategies and regulations. The document examines techniques for implementing security strategies, including identifying risks and complying with standards to ensure protection of information.
IBM's security strategy focuses on providing integrated security solutions to address modern security challenges posed by compliance needs, human error, skills gaps, and advanced attacks. IBM's portfolio includes security transformation services, security operations and response, and information risk and protection solutions. The company aims to help customers optimize their security programs, orchestrate defenses throughout the attack lifecycle, and keep critical information protected.
National Cybersecurity - Roadmap and Action PlanDr David Probert
Analysis, strategies and practical action plans for National Government Cybersecurity based upon the United Nations - International Telecommunications Union - UN/ITU Cybersecurity Framework and their Global Cybersecurity Agenda - GCA.
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingTony Martin-Vegue
Slides from Tony Martin-Vegue's presentation at the ISACA Fall Conference: October 15th, 2014
"How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling"
Abstract:
CISO’s and risk analysts alike often get caught up in checking boxes on a list of control objectives in order to satisfy compliance and regulatory requirements. However, companies that only view risk through a narrow, regulatory or compliance-focused lens have the potential to overlook a myriad of threats that could impact business continuity, customer privacy and security and financial solvency. The last several high-profile data breaches prove that compliance does not equal security.
There are many ways to assess risk in a meaningful, efficient way that drives business value. Many top companies are moving away from control-based and vulnerability-based risk assessments and are instead putting themselves in the shoes of an attacker. In order to keep up with the rapidly evolving world of cyber criminals and crime rings, organizations are learning to utilize threat intelligence to ascertain the methods, goals, and objectives of threat agents that are targeting their firm or similar firms in their sector. This helps an organization produce focused risk assessments that take a business-centric approach.
This is a beginner to intermediate-level presentation designed to provide an introduction to threat modeling, a primer on threat modeling techniques, ways to integrate threat modeling into risk management frameworks (such as FAIR and NIST), and how to build a library of threat agents specific to one’s firm. Attendees will learn hands-on techniques to perform threat modeling that they will be able to immediately integrate into their risk assessment processes.
This document discusses threat modeling for software applications. It covers the key stages of threat modeling including decomposing the application, determining and ranking threats using STRIDE, and determining countermeasures. Specific topics covered include threat modeling approaches, data flow diagrams, trust levels, the STRIDE framework for analyzing spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege threats. It also discusses mobile threat modeling and provides an example threat analysis of a student results portal application.
Security Training: #3 Threat Modelling - Practices and ToolsYulian Slobodyan
This document provides an overview of threat modeling practices and tools. It begins with an introduction that defines threat modeling and outlines its benefits. It then covers threat modeling basics like principles, approaches and reasons it is avoided. The main threat modeling process is described, including creating diagrams, identifying threats and planning mitigations. Popular threat modeling tools and a demo are discussed. Standard mitigation techniques and a sample threat model appendix are also included.
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Sounil Yu
The Cyber Defense Matrix enables organizations to define clear categories for the range of products and services that are available in the marketplace to solve our various infosec problems. This model removes confusion around the security technologies that we buy and helps organizations align their vendors to have the right suite of capabilities to execute their information security mission.
See the 2019 version at: http://bit.ly/cyberdefensematrixreloaded
See the 2022 version at: http://bit.ly/cyberdefensematrixrevolutions
The document provides guidelines for project risk management based on the six risk management processes from the PMBOK Guide. It discusses identifying risks, performing qualitative and quantitative risk analysis, planning risk responses, and controlling risks. An example application to a PMP certification course project is provided to demonstrate practical use of identifying risks, creating a risk register, and customizing a risk breakdown structure for the project.
This document discusses application threat modeling (ATM) as a systematic approach to identifying security risks in software applications. It describes how ATM can be used at different stages of the software development lifecycle, from requirements to design to testing. The key steps of ATM include decomposing the application, identifying threats and vulnerabilities, analyzing attack vectors, and determining mitigation strategies. ATM helps prioritize risks and supports decision making around risk acceptance, avoidance, or mitigation.
The document discusses the development of a cyber security framework for Ontario's electricity distribution sector. It aims to establish consistent expectations for protecting privacy and ensuring reliable grid operations amid increasing cybersecurity risks from smart grid technologies. The proposed framework draws from NIST cybersecurity standards and incorporates privacy by design principles. It includes a risk profiling tool to help utilities assess cybersecurity preparedness needs based on risk levels. Reporting would involve self-assessments and board-level attestations to regulators. The framework is intended to guide utilities while allowing flexibility, and future engagement is planned with additional stakeholders.
The document provides information about the Chic'N Poultry Business feasibility study. The business will be located in Bugasong, Antique and will raise broiler chickens for 45 days to produce dressed chicken meat and by-products. It will have 800 broiler chickens. The operational process involves purchasing day-old chicks, feeding them three times a day, vaccination, processing into dressed chicken, and delivery to customers in Bugasong and nearby municipalities. The target market is restaurants, meat shops, and food stalls. The owner aims to be the leading supplier of dressed chicken in the area and increase profits by 5% annually over 5 years.
The document discusses the process of planning communication management. It describes determining stakeholder communication needs, defining the communication approach, and developing a communication management plan. The plan outlines how information will be distributed, stakeholders who will receive it, communication methods, and other details. Inputs include the project management plan, stakeholder register, and organizational assets. Tools include analyzing requirements, models, methods, meetings, and technology. The output is a communication management plan document.
This document discusses risk and risk management. It defines risk as uncertainty about potential losses and categorizes risks as objective or subjective. It also discusses concepts like chance of loss, perils, hazards, and different types of risks like fundamental risk, particular risk, and enterprise risk. The objectives and steps of the risk management process are also outlined, including identifying exposures, analyzing frequency and severity of losses, selecting risk control or financing techniques, and implementing and monitoring the risk management program.
The document discusses the concept of risk, including defining risk, measuring risk, and the nature of risk. It then categorizes types of risk as personal risks, property risks, liability risks, fidelity risks, and risks due to vehicle ownership. The document also covers risk management, defining it as identifying, analyzing, and controlling risks. It discusses features, objectives, and methods of risk management, including risk identification, scope of managing risk, and organizing a risk management team.
Risk management is the process of identifying and mitigating risks that may have a positive or negative impact on a project. It includes risk management planning, identification, analysis, response planning, and monitoring and control. Analyzing risks qualitatively and quantitatively helps prioritize them so appropriate responses can be developed, such as avoiding, transferring, mitigating, or accepting risks. Monitoring risks ensures new risks are identified and risk responses remain effective over the project lifecycle. The benefits of effective risk management include more efficient resource use, continuous improvement, fewer failures, and enhanced communication and accountability.
The document discusses project risk management and outlines six processes for managing risk: risk management planning, risk identification, qualitative risk analysis, quantitative risk analysis, risk response planning, and risk monitoring and control. It provides details on tools and techniques used in each process, such as documentation reviews, information gathering, probability and impact matrices, and quantitative risk analysis modeling. The overall goal of risk management is to increase the probability of positive events and decrease the probability of negative events on a project.
Build an Information Security StrategyAndrew Byers
Organizations are struggling to keep up with today’s evolving threat landscape.
From technology sophistication and business adoption to the proliferation of hacking techniques and the expansion of hacking motivations, organizations are facing major security risks.
Every organization needs some kind of information security program to protect their systems and assets.
Organizations today face pressure from regulatory or legal obligations, customer requirement, and now, senior management expectations.
The document discusses security assessments and threat modeling for software applications. It provides an overview of the current state of the software industry and common security issues. It then describes the process for conducting a threat modeling session, including identifying security requirements, understanding the application architecture, identifying potential threats, and determining existing countermeasures and vulnerabilities. Conducting threat modeling helps prioritize testing and inform secure development practices.
Threat Modeling workshop by Robert HurlbutDevSecCon
This document summarizes a presentation on threat modeling concepts and processes. It began with defining key threat modeling terms like assets, threats, vulnerabilities, and risk. It described threat modeling as understanding potential threats to a system. The presentation covered approaches like STRIDE and asking questions. It emphasized decomposing systems and identifying threats through data flows. Determining mitigations and risk ratings for threats was also discussed. The goal of threat modeling is to have an ongoing, living understanding of security risks to a system.
This document discusses different types of security assessments:
1) Technical security testing assesses security flaws through vulnerability assessments, network penetration testing, web application testing, and source code analysis.
2) Security process assessments evaluate weaknesses in security processes by reviewing frameworks like NIST CSF and COBIT.
3) Security audits involve compliance checks both internally and externally to verify proper security controls are in place.
Security issues often neglected until coding step in
software development process, and changing in this step leads to
maximize time and cost consuming depending on the size of the
project. Applying security on design phase can fix vulnerabilities
of the software earlier in the project and minimize the time and
cost of the software by identifying security flaws earlier in the
software life cycle. This work concerns with discussing security
metrics for object oriented class design, and implementing these
metrics from Enterprise Architect class diagram using a
proposed CASE tool.
Looking to understand how hackers and other attackers use cyber technology to attack your network and your executives? This slide set provides an overview and details the anatomy of a cyber attack, and the strategies you can use to manage and mitigate risk.
The document discusses application threat modeling for a college library website. It describes decomposing the application into external dependencies, entry points, assets, and trust levels. It then covers determining and ranking threats using STRIDE and ASF categorizations. The document outlines identifying security controls and countermeasures to address vulnerabilities. It provides steps for threat analysis and defining mitigation strategies.
The document discusses security goals for application development in Java. It compares the three goals of protecting sensitive data, controlling access to resources, and logging activity, to the five standard security goals of authenticity, confidentiality, integrity, availability, and non-repudiation. It also discusses security policies, analyzing security requirements including risk assessment and data exposure vulnerabilities, the importance of usability, and contingency plans for security breaches. Finally, it mentions various security technologies and tools for implementation including features of Java.
This document provides an overview of strategies to defend against malware threats in mobile app ecosystems. It begins with a data flow diagram that maps the flow of data and processes. It then discusses an attacker model and uses STRIDE threat analysis to evaluate spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege threats. Finally, it proposes five lines of defense: app review using automated and manual analysis, reputation mechanisms based on app history, app revocation, device security features, and walled gardens/jails that restrict apps.
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
Draft document to present findings of exploratory work on the incorporation of machine learning and AI into an existing data security product. The project was abandoned due to conflicting work done by product management.
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...CSCJournals
Most of the Jordanian universities’ inquiries systems, i.e. educational, financial, administrative, and research systems are accessible through their campus networks. As such, they are vulnerable to security breaches that may compromise confidential information and expose the universities to losses and other risks. At Jordanian universities, security is critical to the physical network, computer operating systems, and application programs and each area has its own set of security issues and risks. This paper presents a comparative study on the security systems at the Jordanian universities from the viewpoint of prevention and intrusion detection. Robustness testing techniques are used to assess the security and robustness of the universities’ online services. In this paper, the analysis concentrates on the distribution of vulnerability categories and identifies the mistakes that lead to a severe type of vulnerability. The distribution of vulnerabilities can be used to avoid security flaws and mistakes.
This document outlines a cyber threat intelligence (CTI) project for Strong Manufacturing Corp. It discusses CTI concepts like the intelligence lifecycle and team structure. It proposes a CTI team of 6 members and describes how the team would integrate with security operations, incident response, and external organizations. The document also covers threat modeling approaches like PASTA and proposes a 50/20/30 budgeting strategy to fund CTI training, partnerships, and tools.
THE MESA SECURITY MODEL 2.0: A DYNAMIC FRAMEWORK FOR MITIGATING STEALTH DATA ...IJNSA Journal
The rising complexity of cyber threats calls for a comprehensive reassessment of current security frameworks in business environments. This research focuses on Stealth Data Exfiltration (SDE), a significant cyber threat characterized by covert infiltration, extended undetectability, and unauthorized dissemination of confidential data. Our findings reveal that conventional defense-in-depth strategies often fall short in combating these sophisticated threats, highlighting the immediate need for a shift in information risk management across businesses. The evolving nature of cyber threats, driven by advancements in techniques, such as social engineering, multi-vector attacks, and the emergence of Generative AI, underscores the need for robust, adaptable, and comprehensive security strategies. As we continue to navigate this complex landscape, it is crucial that we stay ahead of the curve, anticipating potential threats, and continually updating our defenses to protect against them.
We propose a shift from traditional perimeter-based, prevention-focused models, which depend on a static attack surface, to a more dynamic framework that prepares for inevitable breaches. This suggested model, known as ‘MESA 2.0 Security Model’, prioritizes swift detection, immediate response, and ongoing resilience, thereby enhancing an organization’s ability to promptly identify and neutralize threats, significantly reducing the consequences of security breaches. This study suggests that businesses adopt a forward-thinking and adaptable approach to security management, which is crucial for staying ahead of the ever-changing cyber threat landscape. By shifting focus from merely preventing incidents to effectively managing them, organizations can better safeguard their vital digital assets against the increasingly complex tactics used by contemporary cyber adversaries. This study provides valuable insights and a solid strategic framework that aims to steer the development of future security practices and policies to effectively address and mitigate advanced persistent threats.
This document discusses threat modeling and provides an overview of the threat modeling process. It defines key terms like threat agent, threat, vulnerability, and asset. It explains that threat modeling is important to identify threats and vulnerabilities in order to design appropriate defenses. The threat modeling process involves 5 steps: 1) identify security objectives, 2) create an application overview, 3) decompose the application, 4) identify threats, and 5) identify vulnerabilities. For each step, it describes the relevant inputs and expected outputs. The overall goal is to understand vulnerabilities in order to address relevant threats to the system.
The document discusses various threat modeling processes and tools that can be used to secure an e-learning environment. It describes the basics of threat modeling including gathering information about the system, decomposing applications into components, identifying risks through use cases and attack trees. Several threat modeling approaches are outlined such as Microsoft's threat modeling process, STRIDE classification scheme, DREAD, and OCTAVE. The advantages of using threat modeling to understand vulnerabilities and develop mitigation strategies are also highlighted.
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...SOFTTECHHUB
I started my online journey with several hosting services before stumbling upon Ai EngineHost. At first, the idea of paying one fee and getting lifetime access seemed too good to pass up. The platform is built on reliable US-based servers, ensuring your projects run at high speeds and remain safe. Let me take you step by step through its benefits and features as I explain why this hosting solution is a perfect fit for digital entrepreneurs.
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell
With expertise in data architecture, performance tracking, and revenue forecasting, Andrew Marnell plays a vital role in aligning business strategies with data insights. Andrew Marnell’s ability to lead cross-functional teams ensures businesses achieve sustainable growth and operational excellence.
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc
Most consumers believe they’re making informed decisions about their personal data—adjusting privacy settings, blocking trackers, and opting out where they can. However, our new research reveals that while awareness is high, taking meaningful action is still lacking. On the corporate side, many organizations report strong policies for managing third-party data and consumer consent yet fall short when it comes to consistency, accountability and transparency.
This session will explore the research findings from TrustArc’s Privacy Pulse Survey, examining consumer attitudes toward personal data collection and practical suggestions for corporate practices around purchasing third-party data.
Attendees will learn:
- Consumer awareness around data brokers and what consumers are doing to limit data collection
- How businesses assess third-party vendors and their consent management operations
- Where business preparedness needs improvement
- What these trends mean for the future of privacy governance and public trust
This discussion is essential for privacy, risk, and compliance professionals who want to ground their strategies in current data and prepare for what’s next in the privacy landscape.
Artificial Intelligence is providing benefits in many areas of work within the heritage sector, from image analysis, to ideas generation, and new research tools. However, it is more critical than ever for people, with analogue intelligence, to ensure the integrity and ethical use of AI. Including real people can improve the use of AI by identifying potential biases, cross-checking results, refining workflows, and providing contextual relevance to AI-driven results.
News about the impact of AI often paints a rosy picture. In practice, there are many potential pitfalls. This presentation discusses these issues and looks at the role of analogue intelligence and analogue interfaces in providing the best results to our audiences. How do we deal with factually incorrect results? How do we get content generated that better reflects the diversity of our communities? What roles are there for physical, in-person experiences in the digital world?
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Impelsys Inc.
Impelsys provided a robust testing solution, leveraging a risk-based and requirement-mapped approach to validate ICU Connect and CritiXpert. A well-defined test suite was developed to assess data communication, clinical data collection, transformation, and visualization across integrated devices.
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...Alan Dix
Talk at the final event of Data Fusion Dynamics: A Collaborative UK-Saudi Initiative in Cybersecurity and Artificial Intelligence funded by the British Council UK-Saudi Challenge Fund 2024, Cardiff Metropolitan University, 29th April 2025
https://alandix.com/academic/talks/CMet2025-AI-Changes-Everything/
Is AI just another technology, or does it fundamentally change the way we live and think?
Every technology has a direct impact with micro-ethical consequences, some good, some bad. However more profound are the ways in which some technologies reshape the very fabric of society with macro-ethical impacts. The invention of the stirrup revolutionised mounted combat, but as a side effect gave rise to the feudal system, which still shapes politics today. The internal combustion engine offers personal freedom and creates pollution, but has also transformed the nature of urban planning and international trade. When we look at AI the micro-ethical issues, such as bias, are most obvious, but the macro-ethical challenges may be greater.
At a micro-ethical level AI has the potential to deepen social, ethnic and gender bias, issues I have warned about since the early 1990s! It is also being used increasingly on the battlefield. However, it also offers amazing opportunities in health and educations, as the recent Nobel prizes for the developers of AlphaFold illustrate. More radically, the need to encode ethics acts as a mirror to surface essential ethical problems and conflicts.
At the macro-ethical level, by the early 2000s digital technology had already begun to undermine sovereignty (e.g. gambling), market economics (through network effects and emergent monopolies), and the very meaning of money. Modern AI is the child of big data, big computation and ultimately big business, intensifying the inherent tendency of digital technology to concentrate power. AI is already unravelling the fundamentals of the social, political and economic world around us, but this is a world that needs radical reimagining to overcome the global environmental and human challenges that confront us. Our challenge is whether to let the threads fall as they may, or to use them to weave a better future.
Role of Data Annotation Services in AI-Powered ManufacturingAndrew Leo
From predictive maintenance to robotic automation, AI is driving the future of manufacturing. But without high-quality annotated data, even the smartest models fall short.
Discover how data annotation services are powering accuracy, safety, and efficiency in AI-driven manufacturing systems.
Precision in data labeling = Precision on the production floor.
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, presentation slides, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
Mobile App Development Company in Saudi ArabiaSteve Jonas
EmizenTech is a globally recognized software development company, proudly serving businesses since 2013. With over 11+ years of industry experience and a team of 200+ skilled professionals, we have successfully delivered 1200+ projects across various sectors. As a leading Mobile App Development Company In Saudi Arabia we offer end-to-end solutions for iOS, Android, and cross-platform applications. Our apps are known for their user-friendly interfaces, scalability, high performance, and strong security features. We tailor each mobile application to meet the unique needs of different industries, ensuring a seamless user experience. EmizenTech is committed to turning your vision into a powerful digital product that drives growth, innovation, and long-term success in the competitive mobile landscape of Saudi Arabia.
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Aqusag Technologies
In late April 2025, a significant portion of Europe, particularly Spain, Portugal, and parts of southern France, experienced widespread, rolling power outages that continue to affect millions of residents, businesses, and infrastructure systems.
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungenpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-und-verwaltung-von-multiuser-umgebungen/
HCL Nomad Web wird als die nächste Generation des HCL Notes-Clients gefeiert und bietet zahlreiche Vorteile, wie die Beseitigung des Bedarfs an Paketierung, Verteilung und Installation. Nomad Web-Client-Updates werden “automatisch” im Hintergrund installiert, was den administrativen Aufwand im Vergleich zu traditionellen HCL Notes-Clients erheblich reduziert. Allerdings stellt die Fehlerbehebung in Nomad Web im Vergleich zum Notes-Client einzigartige Herausforderungen dar.
Begleiten Sie Christoph und Marc, während sie demonstrieren, wie der Fehlerbehebungsprozess in HCL Nomad Web vereinfacht werden kann, um eine reibungslose und effiziente Benutzererfahrung zu gewährleisten.
In diesem Webinar werden wir effektive Strategien zur Diagnose und Lösung häufiger Probleme in HCL Nomad Web untersuchen, einschließlich
- Zugriff auf die Konsole
- Auffinden und Interpretieren von Protokolldateien
- Zugriff auf den Datenordner im Cache des Browsers (unter Verwendung von OPFS)
- Verständnis der Unterschiede zwischen Einzel- und Mehrbenutzerszenarien
- Nutzung der Client Clocking-Funktion
Big Data Analytics Quick Research Guide by Arthur MorganArthur Morgan
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
HCL Nomad Web – Best Practices and Managing Multiuser Environmentspanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-and-managing-multiuser-environments/
HCL Nomad Web is heralded as the next generation of the HCL Notes client, offering numerous advantages such as eliminating the need for packaging, distribution, and installation. Nomad Web client upgrades will be installed “automatically” in the background. This significantly reduces the administrative footprint compared to traditional HCL Notes clients. However, troubleshooting issues in Nomad Web present unique challenges compared to the Notes client.
Join Christoph and Marc as they demonstrate how to simplify the troubleshooting process in HCL Nomad Web, ensuring a smoother and more efficient user experience.
In this webinar, we will explore effective strategies for diagnosing and resolving common problems in HCL Nomad Web, including
- Accessing the console
- Locating and interpreting log files
- Accessing the data folder within the browser’s cache (using OPFS)
- Understand the difference between single- and multi-user scenarios
- Utilizing Client Clocking
3. Focusing on software because...
We deploy infrastructure controls (firewalls, anti-malware,
IDS/IPS, etc.), but what are we trying to protect? What is
vulnerable? – data and applications.
According to Gartner*, in 2014 enterprises spent $12B
securing their network perimeters, but only $600M
security applications.
Depending on industry, web applications account for up to
35% of data breaches.*
Lessons are applicable to other attack surfaces
Usefulness of approaching a complex problem from
multiple angles
4. If it’s about people, processes and
technology...
What do we want these people to get out of the exercise?
5. We can...
Quantify risks in a realistic manner (disclaimer,
disclaimer).
Identify previously unexamined control gaps exposing
high-impact systems or processes.
Identify the mitigations that will give the best bang for
the buck – not a ROI number, but relative ranking.
Give a realistic picture of how (in)secure we really are
8. What is a “threat”?
Open Group – “Anything that is capable of acting in a
manner resulting in harm to an asset and/or
organization; for example, acts of God (weather,
geological events, etc.); malicious actors; errors; failures.”
(The Open Group, 2009)
DHS – “Natural or man-made occurrence, individual, entity,
or action that has or indicates the potential to harm life,
information, operations, the environment, and/or
property.” (Department of Homeland Security [DHS],
2010)
BITS – “Threat is anything that can act against an asset
resulting in a potential loss.” (BITS, 2012)
9. Ways to model threats in software
Find all possible / likely bad actions
Attack trees
Misuse / Abuse cases
CAPEC
Analyze the code / application
Architectural Risk Analysis
Attack surface analysis
Attack paths
SDL
Code review
Static analysis
Blackbox methods
Fuzzing
Vulnerability scanning
10. Challenges to doing threat modeling
Confusion on what constitutes a threat vs. a vulnerability vs. a risk
Lack of guidance on methods to identify assets
Requiring participants with requisite expertise and training in
threat analysis, a strong understanding of application design and
a well-structured process
Security experts often learn from different risk profiles and use
different techniques for modeling
Teaching threat modeling requires an apprentice-based approach
that involves an appropriate curricula, adequate investment in
effective education tools and a process for educating appropriate
constituencies
Different types of applications have very different risk profiles
meaning the threats will vary depending factors such as the
application architecture
(BITS, 2012)
16. “Design flaws account for 50
percent of security problems, and
architectural risk analysis plays an
essential role in any solid security
program.” (McGraw, 2006)
Architectural Risk Review
17. Architectural flaw examples:
Forgot to authenticate the user
Broken authentication mechanism
No mapping of access control to job requirements
Insecure (or no) implementation of auditing functions
Failure to understand trust relationships – too much
trust
Failure to employ encryption
Dependence on components with known
vulnerabilities (libraries, frameworks, other modules)
18. Attack Surface Analysis
Targets and enablers
Resources (processes and data) that an attacker can use or
co-opt.
Channels and protocols
Message passing and shared memory between endpoint
processes and the rules for exchanging information.
Access rights
Associated not only with files and directories, but also
channels and endpoint processes.
(Howard, Pincus & Wing, 2003)
19. Microsoft SDL Overview
Education
Continuous process improvement
Accountability
(Microsoft. SDL Process: Design, 2014)
(Microsoft, 2010)
21. Threat Modeling in the Microsoft SDL
SDL Phase II – Design:
“Threat modeling is used in environments where there
is meaningful security risk. It is a practice that allows
development teams to consider, document, and discuss
the security implications of designs in the context of
their planned operational environment and in a
structured fashion. Threat modeling also allows
consideration of security issues at the component or
application level. Threat modeling is a team exercise,
encompassing program/project managers, developers,
and testers.”
(Microsoft, 2010)
22. MS Threat Modeling steps
Diagramming
Data flow
Threat Enumeration
Focus on trust boundaries
S•T•R•I•D•E
List of threats
Team exercise engaging program/project managers,
developers and testers
Mitigation
Validation
Completeness & accuracy of threats and the model
(Shostack, 2008)
23. STRIDE
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Escalation of Privilege
(Shostack, 2008)
26. Critical Security Controls
CSC 2: Inventory of Authorized and Unauthorized
Software.
CSC 4: Continuous Vulnerability Assessment and
Remediation.
CSC 18: Application Software Security.
CSC 20: Penetration Tests and Red Team Exercises (in
a mature control environment)
27. Asset Characterization
Excerpt from System Characterization Worksheet, available under Creative Commons license at
http://www.redcedarnet.com/p/blog-page.html
28. Asset list or database
Impacts
Asset Confidentiality
Impact
Integrity
Impact
Availability
Impact
Has
Exposure
X
Has
Exposure
Y
Inherent
Risk
Control
Strength
Overall Score
Residual Risk
LOB App1 $1M $200K $500K Y Y 100 4 25
Customer
Svc App
$800K $100K $80K N Y 45 3 15
30. Risk, impact, likelihood, recommendation
Risk Impact Likelihood Recommendation
History of poor
coding practices:
While patches are
available to address
known vulnerabilities in
the currently installed
application version,
application vendor,
SoftCorp, has had a
history of severe
vulnerabilities recurring
in multiple products.
Their response to
reported vulnerabilities
has sometimes taken up
to a year to address such
issues.
Application processes
thousands of records
daily and stores
approximately 1.2
million unique data
records. Unauthorized
disclosure of this data
could lead to costs in
excess of risk appetite
related to:
Communication to
regulators and
customers,
investigations,
emergency remediation
activities, enhanced
regulatory scrutiny
Currently known and
previously patched
vulnerabilities have
been susceptible to
exploitation by
attackers possessing
minimal skill or
resources and only
external connectivity.
1. Apply available
patches
2. Deploy a Web
Application
Firewall between
users and the
application server.
3. Evaluate the
feasibility of
migrating to other
available products.
Management
Response:
31. Quantifying Risk
Granularity?
Percentage of similar organizations experiencing a
breach
Detailed analysis of likelihood impacting a given
exposure
Control Strength
Threat Capability
Loss Event Frequency
What is the event / scenario?
32. Loss Magnitude
Direct costs due to loss of integrity
Direct costs due to unavailability
Don’t ask about confidentiality, ask about factors that
allow you to calculate it as the expert:
Number of unique data records holding PII/NPII/PHI
Number of financial transactions processed by the
application daily / monthly
Dollar value of financial transactions processed by the
application if any, daily / monthly
34. Insider Threat
SEI CERT has a database cataloging more than 700
cases of malicious insider activity.*
Methods vary between cases involving technical staff
and those that don’t.
Our threat models and controls need to address both
35. Who uses or recommends threat
modeling?
Microsoft
Apple (Apple, 2014)
EMC (Dhillon, 2011)
VMware
Oracle (Oracle, 2014)
Mitre Corporation (MITRE, 2011)
India (Microsoft 2012)
Are you studying for the CSSLP? (ISC2, 2013)
37. Apple. Risk Assessment and Threat Modeling. Retrieved 23 June 2014, from
https://developer.apple.com/library/mac/documentation/security/concept
ual/security_overview/ThreatModeling/ThreatModeling.html#//apple_ref/
doc/uid/TP40002495-SW5
BITS / The Financial Services Roundtable. (2011). Software Assurance Framework.
http://www.bits.org/publications/security/BITSSoftwareAssurance0112.pdf
Brenneman, D. Improving Software Security by Identifying and Securing Paths
Linking Attack Surfaces to Attack Targets. McCabe Software. Retrieved 9
June 2014, from
http://www.mccabe.com/pdf/Identifying%20and%20Securing%20Paths%2
0Linking%20Attack%20Surfaces%20to%20Attack%20Targets.pdf
BSIMM. Building Security In Maturity Model. Retrieved 24 June 2014, from
http://www.bsimm.com/online/ssdl/aa/
Department of Homeland Security. (2010). DHS Risk Lexicon.
http://www.dhs.gov/xlibrary/assets/dhs-risk-lexicon-2010.pdf
38. Dhillon, D. (2011). Developer-Driven Threat Modeling. IEEE Security &
Privacy. http://www.infoq.com/articles/developer-driven-threat-
modeling
Dougherty, C., Sayre, K., Seacord, R., Svoboda, D., Togashi, K. (October
2009). Secure Design Patterns. Technical Report CMU/SEI-2009-
TR-010 . Carnegie Mellon University Software Engineering
Institute. http://resources.sei.cmu.edu/library/asset-
view.cfm?assetid=9115
Hafiz, M., Security Pattern Catalog. Retrieved 13 June 2014 from
http://www.munawarhafiz.com/securitypatterncatalog/index.php
Howard, M., Pincus, J., & Wing, J. (2003). Measuring Relative Attack
Surfaces. http://www.cs.cmu.edu/~wing/publications/Howard-
Wing03.pdf
ISC2. (2013). Certified Secure Software Lifecycle Professional. April 2013.
https://www.isc2.org/csslp/default.aspx
McGraw, G. (2006). Software Security: Building Security In. Addison-
Wesley. ISBN-10: 0321356705
39. Microsoft Corporation. Benefits of the SDL. Retrieved 20 June 2014, from
http://www.microsoft.com/security/sdl/about/benefits.aspx
Microsoft Corporation (2012). Government of India Embraces Secure
Application Development. http://www.microsoft.com/en-
us/download/confirmation.aspx?id=29857
Microsoft Corporation. (2014). Introducing Microsoft Threat Modeling
Tool 2014. Retrieved 23 June 2014, from
http://blogs.msdn.com/b/sdl/archive/2014/04/15/introducing-
microsoft-threat-modeling-tool-2014.aspx
Microsoft Corporation. SDL Process: Design. Retrieved 24 June 2014, from
http://www.microsoft.com/security/sdl/process/design.aspx
Microsoft Corporation. (2010). Simplified Implementation of the Microsoft
SDL. http://www.microsoft.com/en-
us/download/details.aspx?id=12379&751be11f-ede8-5a0c-058c-
2ee190a24fa6=True
MITRE Corporation. (2014). Common Attack Pattern Enumeration and
Classification. Retrieved 6 June 2014, from http://capec.mitre.org/
40. MITRE Corporation. (2011). Threat Assessment and
Remediation Analysis (TARA).
http://www.mitre.org/publications/technical-
papers/threat-assessment--remediation-analysis-
tara
The Open Group. (2009). Risk Taxonomy.
https://www2.opengroup.org/ogsys/catalog/C13K
Schneier, B. (1999). Attack Trees. Schneier on Security.
Retrieved 13 June 2014, from
https://www.schneier.com/paper-attacktrees-ddj-
ft.html
41. Scott, J. & Kazman, R. (2009). Realizing and Refining Architectural
Tactics: Availability.
http://www.sei.cmu.edu/reports/09tr006.pdf
Security Architecture Patterns. In Open Security Architecture.
Retrieved 13 June 2014 from
http://www.opensecurityarchitecture.org/cms/library/patter
nlandscape
Shostack, A. (2008). Experiences Threat Modeling at Microsoft.
http://blogs.msdn.com/b/sdl/archive/2008/10/08/experience
s-threat-modeling-at-microsoft.aspx
Singhal, A. & Ou, X. (2011). Security Risk Analysis of Enterprise
Networks Using Probabilistic Attack Graphs. National
Institute of Standards and Technology Interagency Report
7788. http://csrc.nist.gov/publications/nistir/ir7788/NISTIR-
7788.pdf