Abstract
In this chapter, we look at the fundamental task of understanding what we are trying to protect and where threats come from. There are a number of ways to achieve this. The first method we will look at is asset modelling, which seeks to enumerate what we want to protect by looking at what is valuable to our organization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Baker, M. (2022). Threat Modelling. In: Secure Web Application Development . Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-8596-1_3
Download citation
DOI: https://doi.org/10.1007/978-1-4842-8596-1_3
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-8595-4
Online ISBN: 978-1-4842-8596-1
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)