• DocumentCode
    1180452
  • Title

    Demystifying the threat modeling process

  • Author

    Torr, Peter

  • Author_Institution
    Microsoft, USA
  • Volume
    3
  • Issue
    5
  • fYear
    2005
  • Firstpage
    66
  • Lastpage
    70
  • Abstract
    In today´s hostile online environment, software must be designed to withstand malicious attacks of all kinds. Unfortunately, even security-conscious products can fall prey when designers fail to understand the threats their software faces or the ways in which adversaries might try to attack it. To better understand a product´s threat environment and defend against potential attacks, Microsoft uses threat modeling, which should be treated like any other part of the design and specification process. In fact, singling it out as a special activity performed outside the normal design process actually detracts from its importance to the overall development life cycle. We must consider security needs throughout the design process, just as we do with performance, usability, localizability, serviceability, or any other facet.
  • Keywords
    formal specification; object-oriented programming; security of data; software maintenance; software reusability; Microsoft; development life cycle; hostile online environment; software design; threat environment; threat modeling process; Authentication; Data security; Design automation; HTML; Information security; Libraries; Web and internet services; Web server; Web services; XML; product development; security; software development; threat environment; threat modeling;
  • fLanguage
    English
  • Journal_Title
    Security & Privacy, IEEE
  • Publisher
    ieee
  • ISSN
    1540-7993
  • Type

    jour

  • DOI
    10.1109/MSP.2005.119
  • Filename
    1514406