Skip to Content
For Enterprise
For Government
For Higher Ed
For Individuals
For Marketing
For Enterprise
For Government
For Higher Ed
For Individuals
For Marketing
Explore Skills
Cloud Computing
Microsoft Azure
Amazon Web Services (AWS)
Google Cloud
Cloud Migration
Cloud Deployment
Cloud Platforms
Data Engineering
Data Warehouse
SQL
Apache Spark
Microsoft SQL Server
MySQL
Kafka
Data Lake
Streaming & Messaging
NoSQL Databases
Relational Databases
Data Science
Pandas
R
MATLAB
SAS
D3
Power BI
Tableau
Statistics
Exploratory Data Analysis
Data Visualization
AI & ML
Generative AI
Machine Learning
Artificial Intelligence (AI)
Deep Learning
Reinforcement Learning
Natural Language Processing
TensorFlow
Scikit-Learn
Hyperparameter Tuning
MLOps
Programming Languages
Java
JavaScript
Spring
Python
Go
C#
C++
C
Swift
Rust
Functional Programming
Software Architecture
Object-Oriented
Distributed Systems
Domain-Driven Design
Architectural Patterns
IT/Ops
Kubernetes
Docker
GitHub
Terraform
Continuous Delivery
Continuous Integration
Database Administration
Computer Networking
Operating Systems
IT Certifications
Security
Network Security
Application Security
Incident Response
Zero Trust Model
Disaster Recovery
Penetration Testing / Ethical Hacking
Governance
Malware
Security Architecture
Security Engineering
Security Certifications
Design
Web Design
Graphic Design
Interaction Design
Film & Video
User Experience (UX)
Design Process
Design Tools
Business
Agile
Project Management
Product Management
Marketing
Human Resources
Finance
Team Management
Business Strategy
Digital Transformation
Organizational Leadership
Soft Skills
Professional Communication
Emotional Intelligence
Presentation Skills
Innovation
Critical Thinking
Public Speaking
Collaboration
Personal Productivity
Confidence / Motivation
Features
All features
AI Academy
Courses
Certifications
Interactive learning
Live events
Superstreams
Answers
Insights reporting
Radar Blog
Buy Courses
Plans
Sign In
Try Now
O'Reilly Platform
book
Threats
by
Adam Shostack
January 2023
Intermediate to advanced content level
Intermediate to advanced
352 pages
8h 6m
English
Wiley
Audiobook available
Content preview from
Threats
Index
A
access control,
176
–182,
185
access control list (ACL),
119
–120,
177
–178
account takeover,
72
–76
artificial intelligence (AI),
53
,
81
,
116
–117
attenuation,
152
,
173
–174
authentic/authentication
attacks on mechanisms of,
28
–30
defenses for,
37
–38
defined,
1
denial of service and,
142
,
144
identifiers and,
2
–12
organization considerations regarding,
24
–25
threats against types of,
30
–36
authority.
See also
expansion of authority
artificial intelligence and,
160
cloud and,
160
,
164
–166
of code,
157
to communicate,
154
–155
confused deputies and,
160
–162
defined,
152
,
182
as design pattern,
182
–185
expanding,
153
,
159
granting of,
154
,
155
Internet of Things and,
163
levels of,
153
machine learning and,
160
mobile phones and,
163
–164
overview of,
126
B
blockchain,
81
–82,
117
business email compromise,
269
–271
C
canonicalization,
158
ciphertext,
123
–124,
127
cloud
authority and,
160
,
164
–166
denial of service and,
144
information disclosure and,
114
–116
kill chain and,
273
–274
repudiation in,
80
spoofing and,
23
tampering with,
53
–54
confused deputy,
160
–162
cryptocurrency,
81
–82,
133
cryptography,
58
,
84
–85,
123
–128
D
data
computation of,
110
–111
human connection of,
106
–107
linkages of,
107
in motion,
101
–103,
104
,
126
–127,
129
obscured,
99
–100
processes and,
104
–105
at rest,
96
–101,
104
,
125
–126,
129
denial of service (DoS)
abundance and,
146
–147
amplification and,
141
authentication services and,
144
authentication targets and,
142
besoke ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial
You might also like
Threats
Adam Shostack
Cyber Threat Intelligence
Martin Lee
Ransomware and Cyber Extortion: Response and Prevention
Sherri Davidoff, Matt Durrin, Karen Sprenger
Measuring and Managing Information Risk
Jack Freund, Jack Jones
Publisher Resources
ISBN: 9781119895169
Purchase Link