Image

Appendix C

Threat Modeling

In order to explain the threat modeling process, we will take a more practical approach of defining, modeling, and measuring the threats of a web store for a fictitious company named Zion, Inc., that has the following requirements:

Zion, Inc. is in the business of selling and renting Zii game consoles, games, and accessories. Lately, it has been losing market share to online competitors who are providing a better customer experience than Zion’s brick and mortar establishments. Zion, Inc,. wants to secure its #1 market leader position for gaming products and services. The company plans to provide a secure, uninterrupted, ...

Get Official (ISC)2 Guide to the CSSLP CBK, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.