Chapter 8. Abuse Cases[1]

Abuse CasesAbuse casesAbuse casesoverviewMisuse cases.Abuse cases.Touchpointslist ofabuse casesUMLUse casesAbuse cases.Parts of this chapter appeared in original form in IEEE Security & Privacy magazine co-authored with Paco Hope and Annie Anton [Hope, McGraw, and Anton 2004].

To kill, you must know your enemy, and in this case my enemy is a varmint. And a varmint will never quit—ever. They’re like the Viet Cong—Varmint Cong. So you have to fall back on superior intelligence and superior firepower. And that’s all she wrote.


Software development is all about making software do something. People who build software tend to describe software requirements in terms of what a system will do when everything goes right—when users are cooperative and helpful, when environments are pristine and friendly, and when code is defect free. The focus is on functionality ...

Get Software Security: Building Security In now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.