Supplemental for Threat Modeling: Designing for Security
Table of Contents for Threat Modeling: Designing for Security
Part I: Getting Started
- Dive in and Threat Model
 - Strategies for Threat Modeling
 
Part II: Finding Threats
- STRIDE
 - Attack Trees
 - Attack Libraries
 - Privacy Tools
 
Part III: Managing and Addressing Threats
- Processing and Managing Threats
 - Defensive Tactics and Technologies
 - Trade-Offs When Addressing Threats
 - Validating That Threats Are Addressed
 - Threat Modeling Tools
 
Part IV: Threat Modeling in Technologies and Tricky Areas
- Requirements Cookbook
 - Web and Cloud Threats
 - Accounts and Identity
 - Human Factors and Usability
 - Threats to Cryptosystems
 
Part V: Taking It to the Next Level
- Bringing Threat Modeling to Your Organization
 - Experimental Approaches
 - Architecting for Success
 
Appendices
- Helpful Tools
 - Threat Trees
 - Attacker Lists
 - Elevation of Privilege : The Cards
 - Case Studies
 
Errata for Threat Modeling: Designing for Security
- Andy Steingrubel's name is mis-spelled (page vii)
 - The first list on page 10 is mis-ordered
 - On page 12, "vertebrae" should read "vertebrate."
 - On page 134/135, tables 7.4 and 7.5 should each open with "threat type," rather than "threat".
 - On page 154, under "Operational Assurance of Confidentiality" The last sentence, "With regard to a network, it may be possible to use SSH or SSL tunneling or IPSec to address network tampering issues." should read: "With regard to a network, it may be possible to use SSH or SSL tunneling or IPSec to address network confidentiality issues."
 - Phil Zimmermann's name is consistently misspelled.
 - On page 225, the second item of the first list should read "We will detect 75 precent of attacks of type X within time Y, and 50 percent of the remainder within Z."
 - On page 485, there is a reference to sync floods, which is SYN, fully misspelled.
 - On this page, errata was mis-spelled.
 - On page 14 and elsewhere, IPsec is listed as addressing spoofing of a network address. Properly, that's a function of IKE. (Added June 2018)
 - On page xxx of the introduction, the word "influence" should be removed from the phrase "Platforms and API influence may offer security features" (Added June, 2018)
 - On page 4, the Elevation of Privilege link is broken. Good resources are above. (August, 2018)
 - On page 6, it should read 'Many people will treat the terms as interchangeable.' (January, 2019)
 
Errata last updated: June 25, 2018