Chapter 15: Threat Analysis Exercise


Overview

Key concepts in the chapter are:

  • Costing the threat-analysis process

  • Creating application-architecture diagrams

  • Brainstorming and prioritizing threats

  • Responding to threats

In this chapter, you’ll learn how to apply the threat-analysis concepts presented in Chapter 14 to your own application. We’ll walk through the employee management system Web sample application (introduced in Chapter 2) as an exercise in identifying potential threats to which the application is vulnerable.




Security for Microsoft Visual Basic  .NET
Security for Microsoft Visual Basic .NET
ISBN: 735619190
EAN: N/A
Year: 2003
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net