Threat modeling is a form of risk assessment that models aspects of the attack and defense sides of a particular logical entity, such as a piece of data, an application, a host, a system, or an environment. This publication examines data-centric system threat modeling, which is threat modeling that is focused on protecting particular types of data within systems. The publication provides information on the basics of data-centric system threat modeling so that organizations can successfully use it as part of their risk management processes. The general methodology provided by the publication is not intended to replace existing methodologies, but rather to define fundamental principles that should be part of any sound data-centric system threat modeling methodology.
Why buy an eBook when you can download a PDF for free?
First you gotta find it and make sure it’s the latest version, not always easy. It’s much more cost-effective to just order the latest version from Amazon.com
Unlike a PDF, this eBook allows easy page navigation because we bookmarked the Chapters and Appendices. (Don’t judge based on the free sample because that functionality is not activated on the free sample.) Once you buy a copy you will see how easy it is to get to the information you seek - fast.
This material is published by 4th Watch Publishing Co. We publish tightly-bound, full-size books at 8 ½ by 11 inches, with glossy covers. 4th Watch Publishing Co. is a Service Disabled Veteran Owned Small Business (SDVOSB) and is not affiliated with the National Institute of Standards and Technology.
A full copy of over 300 cybersecurity standards is loaded on our CyberSecurity Standards Library DVD which is available at Amazon.com. And, if you need to look up an acronym or the definition of a word, just go to the Cyber Dictionary.