ABSTRACT

The first five chapters of this book are meant to set a context and a basis for the security assessment and threat modeling of any type of system. By “system” I mean not only the implementation of software (“code”), but any sort of digital system integration and deployment. This broader definition will, of course, include the writing of software, as indeed, all digital systems reduce to software. However, there is a higher-order integration that can treat the implementation of blocks of functionality in an atomic way.