UCLA Chap 10 Difference Between Mitigation and Penetrating Testing Paper
Guidelines:
Chapter 10: Validating That Threats Are Addressed
- Explain the difference between Mitigation Testing and Penetrating Testing (75-100 words).
- List five major items that should be included in constructing a Software Model.
- Explain the reason Documenting Assumptions are important in threat modeling (75-100 words).
Chapter 12: Requirements Cookbook
- Explain how the interplay of Requirements, Threats, and Mitigation all work together (75-100 words).
- Why is it important to use People/Process/Technology/ as a Frame for requirements (75-100 words)?
- Why are the Seven Laws of Identity important (75-100 words)?
NOTE: Book details for your reference :
Title | Threat Modeling |
---|---|
Author | Adam Shostack |
ISBN | 978-1-118-80999-0 |
Publisher | John Wiley&Sons, Incorporated |
Publication Date | February 17, 2014 |