Threat Modeling Best Practices: Proven frameworks and practical techniques to secure modern systems
暫譯: 威脅建模最佳實踐:保護現代系統的驗證框架與實用技術
Fisher, Derek
- 出版商: Packt Publishing
- 出版日期: 2025-10-31
- 售價: $1,650
- 貴賓價: 9.5 折 $1,568
- 語言: 英文
- 頁數: 322
- 裝訂: Quality Paper - also called trade paper
- ISBN: 1805128256
- ISBN-13: 9781805128250
-
相關分類:
Penetration-test
海外代購書籍(需單獨結帳)
相關主題
商品描述
Build threat modeling skills with practical advanced techniques to enhance risk analysis, optimize security measures, and stay ahead of emerging threats in the complex cybersecurity landscape
Free with your book: DRM-free PDF version + access to Packt's next-gen Reader*
Key Features:
- Identify and mitigate security threats across software, cloud, mobile, IoT, and supply chains using STRIDE, PASTA, and MITRE ATT&CK
- Learn from real-world case studies showing practical threat modeling applications across industries
- Build threat modeling programs with the right team, tools, SDLC integration, and continuous improvement
Book Description:
Threat modeling has become a cornerstone of modern cybersecurity, yet it is often overlooked, leaving security gaps that attackers can exploit. With the rise in system complexity, cloud adoption, AI-driven threats, and stricter compliance requirements, security teams need a structured approach to proactively stop and spot risks before attackers do. This book does exactly that by providing actionable insights into leveraging industry best practices and emerging technologies to secure systems. It breaks down the fundamentals of threat modeling and walks you through key frameworks and tools such as STRIDE, MITRE ATT&CK, PyTM, and Attack Paths, helping you choose the right model and create a roadmap tailored for business. You'll see how to use leading threat modeling tools, identify and prioritize potential threats, and integrate these practices into the software development life cycle to catch risks early. The book also examines how AI can strengthen analysis and streamline security decision-making for faster, stronger defenses.
By the end, you'll have everything you need to build systems that anticipate and withstand evolving threats, keeping your organization secure in an ever-changing digital landscape.
What You Will Learn:
- Create foundational threat modeling artifacts like Data Flow Diagrams and security architecture diagrams to visualize system threats.
- Understand the relationship between vulnerabilities (exploitable weaknesses) and threats (sources of harm).
- Analyze real-world case studies to see how threat modeling is applied in industry incidents.
- Evaluate and compare popular threat modeling tools, both open source and commercial.
- Explore advanced topics, including threat modeling for cloud environments and integrating with DevSecOps.
Who this book is for:
This book is for cybersecurity professionals, security consultants, penetration testers, and compliance managers seeking to integrate threat modeling into their assessment methodologies and client engagements. It's also ideal for software architects, DevOps engineers, risk managers, and organizational leaders responsible for identifying, assessing, and mitigating security risks in their technological environments. Whether you're new to threat modeling or looking to enhance your existing expertise, this book helps you with foundational knowledge as well as advanced techniques.
Table of Contents
- Threat Modeling Methodologies
- Understanding and Evaluating Threats and Risks
- Prioritizing Risks Found in Threat Modeling
- Threat Modeling of Software
- Threat Modeling of Cloud and Infrastructure
- Threat Modeling the Supply Chain
- Mobile and IoT Threat Modeling
- AI and the Threat Modeling of LLMs
- Building a Threat Modeling Practice
- Future Directions in Threat Modeling
商品描述(中文翻譯)
**建立威脅建模技能,運用實用的進階技術來增強風險分析、優化安全措施,並在複雜的網路安全環境中領先於新興威脅**
**購書附贈:無DRM的PDF版本 + Packt的下一代閱讀器存取權*
**主要特色:**
- 使用STRIDE、PASTA和MITRE ATT&CK識別和減輕軟體、雲端、行動裝置、物聯網及供應鏈中的安全威脅
- 從真實案例研究中學習,展示各行業中威脅建模的實際應用
- 與合適的團隊、工具、SDLC整合及持續改進一起建立威脅建模計畫
**書籍描述:**
威脅建模已成為現代網路安全的基石,但它經常被忽視,留下攻擊者可以利用的安全漏洞。隨著系統複雜性增加、雲端採用、AI驅動的威脅及更嚴格的合規要求,安全團隊需要一種結構化的方法,主動在攻擊者之前發現和阻止風險。本書正是提供了可行的見解,利用行業最佳實踐和新興技術來保護系統。它分解了威脅建模的基本原則,並引導您了解關鍵框架和工具,如STRIDE、MITRE ATT&CK、PyTM和攻擊路徑,幫助您選擇合適的模型並為業務制定量身定制的路線圖。您將學會如何使用領先的威脅建模工具,識別和優先考慮潛在威脅,並將這些實踐整合到軟體開發生命週期中,以便及早捕捉風險。本書還探討了AI如何加強分析並簡化安全決策,以實現更快、更強的防禦。
到最後,您將擁有建立能夠預測和抵禦不斷演變的威脅所需的一切,確保您的組織在不斷變化的數位環境中保持安全。
**您將學到的內容:**
- 創建基礎的威脅建模工件,如資料流圖和安全架構圖,以可視化系統威脅。
- 理解漏洞(可被利用的弱點)與威脅(傷害來源)之間的關係。
- 分析真實案例研究,了解威脅建模在行業事件中的應用。
- 評估和比較流行的威脅建模工具,包括開源和商業工具。
- 探索進階主題,包括雲端環境的威脅建模及與DevSecOps的整合。
**本書適合的人群:**
本書適合網路安全專業人士、安全顧問、滲透測試員和合規經理,尋求將威脅建模整合到其評估方法和客戶互動中。它也非常適合負責識別、評估和減輕其技術環境中安全風險的軟體架構師、DevOps工程師、風險管理者和組織領導者。無論您是威脅建模的新手還是希望提升現有專業知識,本書都能幫助您獲得基礎知識以及進階技術。
**目錄**
- 威脅建模方法論
- 理解和評估威脅與風險
- 在威脅建模中優先考慮風險
- 軟體的威脅建模
- 雲端和基礎設施的威脅建模
- 供應鏈的威脅建模
- 行動裝置和物聯網的威脅建模
- AI與大型語言模型的威脅建模
- 建立威脅建模實踐
- 威脅建模的未來方向