Web application security - the fast guide Chapter 3: Vulnerabilities And Threat Models | Page 4

Identify assets and security objectives 1 Value of the asset to adversaries. Value of the asset to adversaries. Cost to replace the asset if lost. Operational and productivity costs incurred if the asset is unavailable. Liability issues if the asset is compromised. 2 Prioritize and set security objectives. Prioritize depending on the information you collected the specifying the most important assets Set the security objective depending on your findings 2017-05-10 Web Application Security Fast Guide (book slides) By Dr.Sami Khiami Slide 4