Web application security - the fast guide Chapter 3: Vulnerabilities And Threat Models | Page 6
Decompose the application
App
.
4
Decompose the application
identifying trust boundaries
Identifying data flow
Identify entry points
Identify privileged code
Document the security profile
(input validation, authentication, authorization, configuration management, session management, Cryptography,
parameters manipulation, exception management and logging)
2017-05-10
Web Application Security Fast Guide (book slides)
By Dr.Sami Khiami
Slide 6