THREATS what every engineer should learn from star wars

Secure your applications with help from your favorite Jedi masters In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. The book wil...

Full description

Bibliographic Details
Main Author: Shostack, Adam
Format: eBook
Language:English
Published: [S.l.] JOHN WILEY & SONS 2023
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 06186nmm a2200493 u 4500
001 EB002151450
003 EBX01000000000000001289576
005 00000000000000.0
007 cr|||||||||||||||||||||
008 230302 ||| eng
020 |a 9781119897699 
020 |a 9781119895176 
020 |a 1119895170 
050 4 |a QA76.9.A25 
100 1 |a Shostack, Adam 
245 0 0 |a THREATS  |h [electronic resource]  |b what every engineer should learn from star wars 
260 |a [S.l.]  |b JOHN WILEY & SONS  |c 2023 
300 |a 1 online resource 
505 0 |a Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Introduction -- Who This Book Is For -- What You'll Gain from This Book -- A Few Words for the Nonengineer -- Security Terminology -- How This Book Is Organized -- Chapter 1 Spoofing and Authenticity -- Identifiers and Authentication -- Technical Identifiers -- Human Identifiers -- Authenticating People to People -- Authenticating People to Computers -- Authenticating Computers to People -- Authenticating Computers to Computers -- Spoofing Attacks -- Spoofing Files -- Spoofing Processes -- Spoofing Machines 
505 0 |a Includes bibliographical references (pages 303-316) and index 
505 0 |a Other Resources -- Denial-of-Service Properties -- Bespoke or Generalized -- Amplification -- Authentication Targets -- Ephemeral or Persistent -- Direct or Emergent -- Denial of Service in Specific Technologies -- Authentication Services -- Cloud -- Protocol Design -- IoT and Mobile -- Defenses -- Abundance and Quotas -- Graceful Degradation -- Resilience Testing -- Conclusion -- Chapter 6 Expansion of Authority and Isolation -- Expansion Mechanisms and Effects -- Authority in Specific Scenarios -- Confused Deputies -- Internet of Things -- Mobile -- Cloud -- Defenses 
505 0 |a Spoofing in Specific Scenarios -- Internet of Things -- Mobile Phones -- Cloud -- Considerations in Authenticating to Organizations -- Mechanisms for Spoofing Attacks -- Misrepresentation -- Attacks on Authentication Mechanisms -- Threats Against Authentication Types -- Defenses -- Authenticating People -- Authenticating Computers -- Conclusion -- Chapter 2 Tampering and Integrity -- Introduction -- Targets of Tampering -- Tampering with Storage -- Tampering with Communications -- Tampering with Time -- Process Tampering -- Tampering in Specific Technologies -- Mechanisms for Tampering 
505 0 |a Information Disclosure, at Rest -- Information Disclosure, in Motion -- Information Disclosure from a Process -- Human Connections -- Side Effects and Covert Channels -- Information Disclosure Mechanisms -- Information Disclosure with Specific Scenarios -- Internet of Things -- Mobile Phones -- Cloud -- AI/ML -- Blockchain -- Privacy -- Defenses -- Operating System Defenses -- Defending Your Process -- Cryptography -- Conclusion -- Chapter 5 Denial of Service and Availability -- Resources Consumed by Denial-of-Service Threats -- Compute -- Storage -- Networks -- Electrical Power -- Money 
505 0 |a Location for Tampering -- Tools for Tampering -- Defenses -- Cryptography -- The Kernel -- Detection -- Conclusion -- Chapter 3 Repudiation and Proof -- Introduction -- The Threat: Repudiation -- Message Repudiation -- Fraud -- Account Takeover -- Logging Threats -- Repudiation in Specific Technologies -- Internet of Things (Including Phones) -- Cloud -- AI/ML -- Crypto and Blockchain -- Repudiation Mechanisms -- Defenses -- Cryptography -- Keeping Logs -- Using Logs -- Antifraud Tools -- Conclusion -- Chapter 4 Information Disclosure and Confidentiality -- Threats to Confidentiality 
653 |a Guerre des étoiles (Films) 
653 |a Sécurité informatique 
653 |a Computer software / Development / http://id.loc.gov/authorities/subjects/sh85029535 
653 |a Computer software / Development / fast 
653 |a Star Wars films / http://id.loc.gov/authorities/subjects/sh85127382 
653 |a Star Wars films / fast 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
653 |a Computer security / fast 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
015 |a GBC346263 
776 |z 1119895162 
776 |z 9781119895176 
776 |z 1119897696 
776 |z 1119895170 
776 |z 9781119897699 
776 |z 9781119895169 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119895169/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.82 
520 |a Secure your applications with help from your favorite Jedi masters In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn--in a structured and memorable way--about the threats to your systems. You'll move from thinking of security issues as clever one-offs and learn to see the patterns they follow. This book brings to light the burning questions software developers should be asking about securing systems, and answers them in a fun and entertaining way, incorporating cybersecurity lessons from the much-loved Star Wars series. You don't need to be fluent in over 6 million forms of exploitation to face these threats with the steely calm of a Jedi master. You'll also find: Understandable and memorable introductions to the most important threats that every engineer should know Straightforward software security frameworks that will help engineers bake security directly into their systems Strategies to align large teams to achieve application security in today's fast-moving and agile world Strategies attackers use, like tampering, to interfere with the integrity of applications and systems, and the kill chains that combine these threats into fully executed campaigns An indispensable resource for software developers and security engineers, Threats: What Every Engineer Should Learn From Star Wars belongs on the bookshelves of everyone delivering or operating technology: from engineers to executives responsible for shipping secure code