Threats

Book description

Secure your applications with help from your favorite Jedi masters

In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn—in a structured and memorable way—about the threats to your systems. You’ll move from thinking of security issues as clever one-offs and learn to see the patterns they follow.

This book brings to light the burning questions software developers should be asking about securing systems, and answers them in a fun and entertaining way, incorporating cybersecurity lessons from the much-loved Star Wars series. You don’t need to be fluent in over 6 million forms of exploitation to face these threats with the steely calm of a Jedi master.

You’ll also find:

  • Understandable and memorable introductions to the most important threats that every engineer should know
  • Straightforward software security frameworks that will help engineers bake security directly into their systems
  • Strategies to align large teams to achieve application security in today’s fast-moving and agile world
  • Strategies attackers use, like tampering, to interfere with the integrity of applications and systems, and the kill chains that combine these threats into fully executed campaigns

An indispensable resource for software developers and security engineers, Threats: What Every Engineer Should Learn From Star Wars belongs on the bookshelves of everyone delivering or operating technology: from engineers to executives responsible for shipping secure code.

Table of contents

  1. Cover
  2. Title Page
  3. Preface
  4. Introduction
    1. Who This Book Is For
    2. What You'll Gain from This Book
    3. A Few Words for the Nonengineer
    4. Security Terminology
    5. How This Book Is Organized
    6. Note
  5. 1 Spoofing and Authenticity
    1. Identifiers and Authentication
    2. Spoofing Attacks
    3. Spoofing in Specific Scenarios
    4. Mechanisms for Spoofing Attacks
    5. Defenses
    6. Conclusion
    7. Note
  6. 2 Tampering and Integrity
    1. Introduction
    2. Targets of Tampering
    3. Tampering in Specific Technologies
    4. Mechanisms for Tampering
    5. Defenses
    6. Conclusion
    7. Notes
  7. 3 Repudiation and Proof
    1. Introduction
    2. The Threat: Repudiation
    3. Repudiation in Specific Technologies
    4. Defenses
    5. Conclusion
  8. 4 Information Disclosure and Confidentiality
    1. Threats to Confidentiality
    2. Information Disclosure Mechanisms
    3. Information Disclosure with Specific Scenarios
    4. Defenses
    5. Conclusion
    6. Notes
  9. 5 Denial of Service and Availability
    1. Resources Consumed by Denial-of-Service Threats
    2. Denial-of-Service Properties
    3. Denial of Service in Specific Technologies
    4. Defenses
    5. Conclusion
  10. 6 Expansion of Authority and Isolation
    1. Expansion Mechanisms and Effects
    2. Authority in Specific Scenarios
    3. Defenses
    4. Authority and Privilege
    5. Conclusion
    6. Notes
  11. 7 Predictability and Randomness
    1. Predictability Threats
    2. Time and Timing Threats
    3. Predictability in Specific Scenarios
    4. Defenses
    5. Conclusion
    6. Note
  12. 8 Parsing and Corruption
    1. What Is Parsing?
    2. Threats to Parsers
    3. Specific Parsing Scenario Threats
    4. Defenses
    5. Conclusion
    6. Notes
  13. 9 Kill Chains
    1. Threats: Kill Chains
    2. Kill Chains for Specific Scenarios
    3. History
    4. Defenses
    5. Conclusion
  14. Epilogue
  15. Glossary
  16. Bibliography
  17. Story Index
    1. Episode I: The Phantom Menace
    2. Episode III: Revenge of the Sith
    3. Obi-Wan (Television Series)
    4. Rogue One
    5. Star Wars: A New Hope
    6. The Empire Strikes Back
    7. Return of the Jedi
  18. Index
  19. Copyright
  20. Dedication
  21. About the Authors
  22. Acknowledgments
  23. End User License Agreement

Product information

  • Title: Threats
  • Author(s): Adam Shostack
  • Release date: January 2023
  • Publisher(s): Wiley
  • ISBN: 9781119895169