11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3Threat ModelingIn This Chapter●●OverviewSteps to decompose an application architecture to discover vulnerabilitiesHow to identify <strong>and</strong> document threats that are relevant to your applicationThreat modeling allows you to systematically identify <strong>and</strong> rate the threats that aremost likely to affect your system. By identifying <strong>and</strong> rating threats based on a solidunderst<strong>and</strong>ing of the architecture <strong>and</strong> implementation of your application, you canaddress threats with appropriate countermeasures in a logical order, starting with thethreats that present the greatest risk.Threat modeling has a structured approach that is far more cost efficient <strong>and</strong> effectivethan applying security features in a haphazard manner without knowing preciselywhat threats each feature is supposed to address. With a r<strong>and</strong>om, “shotgun”approach to security, how do you know when your application is “secure enough,”<strong>and</strong> how do you know the areas where your application is still vulnerable? In short,until you know your threats, you cannot secure your system.Before You BeginBefore you start the threat modeling process, it is important that you underst<strong>and</strong> thefollowing basic terminology:● Asset. A resource of value, such as the data in a database or on the file system.A system resource.● Threat. A potential occurrence, malicious or otherwise, that might damage orcompromise your assets.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!