O'Reilly logo

CSSLP Certification All-in-One Exam Guide by Daniel Shoemaker, Wm. Arthur Conklin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image
8
Design Processes
In this chapter you will
•  Examine the concept of attack surfaces and attack surface minimization
•  Examine the use of threat modeling to reduce vulnerabilities
•  Examine the integration of enterprise security controls to mitigate threats in software
•  Explore risks associated with code reuse
•  Learn how security gate reviews can use threat modeling and attack surface information to improve security
image
Security implementation begins with requirements, and becomes built in if designed in as part of the design phase of the secure ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required