B



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Abstract syntax tree
Abuse cases
     anti-requirements
     attack models
     attack patterns
     attacker motivation
     benefits of
     constructive/destructive nature
     creating
     description
     development team
     example 2nd
     flyover
     history of
     identifying and documenting threats
     overview
     process diagram
     software developers and information security practitioners
     touchpoint process
Academic software security
Access control policies, modeling
Adversarial security testing
Aitel, Dave
ALE (Annualized Loss Expectancy)
Ambiguity analysis, in architectural risk analysis
Anderson, Ross
Anti-requirements
API Abuse vulnerability kingdom
     description
     example
     phyla
APISPY32
Application security
     badness-ometers
     limitations of
     testing tools 2nd
     versus software security
Applied risk management pillar
Arc injection attacks
Architectural risk analysis
     .NET security model overview
     access control policies, modeling
     ad hoc
     assets
     bugs 2nd
     checklists
     commercial
     common themes
     constructive/destructive nature
     countermeasures
     description
     flaws 2nd
     flyover
     forest-level view 2nd
     getting started
     impact
     in the RMF
     knowledge requirements
     major activities
     necessity of
     one page design overview 2nd
     practical applications
     probability
     process diagram
         ambiguity analysis
         attack resistance analysis
         weakness analysis
     risk analysis, definition
    risk calculation
         impact
         modern model
         traditional model
     risk management, definition
     risks
     ROI (return on investment)
     safeguards
     software developers and information security practitioners
     standards-based
     STRIDE
     terminology
     threat modeling versus risk analysis
     threats
    touchpoint process
         ad hoc approach
         ambiguity analysis
         attack resistance analysis
         critical steps
         examples of flaws 2nd 3rd
         exploit graphs
         process diagram
         weakness analysis
     vulnerabilities
Arciniegas, Fabio
Arkin, Brad
Array out of bounds 2nd
Articles. [See Bibliography]
Artifacts, software 2nd 3rd
ASP.NET Misconfiguration phylum
ASSET
Assets, definition
Assume nothing
AST. [See Abstract syntax tree]
Attack classes
Attack models
Attack patterns
     knowledge catalog 2nd
     list of
     taxonomy of
Attack resistance analysis, in architectural risk analysis
Attacker motivation
Attackers' tools 2nd
     APISPY32
     breakpoint setters
     control flow
     coverage
     decompilers
     disassemblers
     fault injectors
     rootkits
     shell code
Auditing open source applications, tutorial
Authentication phylum 2nd
Automation
     Cigital Workbench
     risk-based security testing




Software Security. Building Security In
Software Security: Building Security In
ISBN: 0321356705
EAN: 2147483647
Year: 2004
Pages: 154
Authors: Gary McGraw

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net