CHAPTER 8: THREAT PROFILING AND SECURITY TESTING
In Chapter 7 we discussed the approach of integrating security requirement analysis, design, implementation and testing into the software development lifecycle stages. In this chapter we will discuss the process of identifying threats to the application and using them in different security testing methods.
Studying the motivations and methods of an adversary is the first step in designing a secure application. The goals and motivations of an adversary are treated as the threats to the application. The structured process of identifying and documenting all possible security threats is called threat profiling. The justification for implementing an application security feature ...