Abstract
No two applications are exactly alike. Thus, the security required to protect one application is likely different—either vastly or slightly—from that required for any other application. Determining to secure your application starts with a proper assessment of the risk posed and corresponding threats. The upcoming section on “Assessment” goes into detail on how to initiate your thinking about security.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2013 Scott Spendolini
About this chapter
Cite this chapter
Spendolini, S. (2013). Threat Analysis. In: Expert Oracle Application Express Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-4732-6_1
Download citation
DOI: https://doi.org/10.1007/978-1-4302-4732-6_1
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-4731-9
Online ISBN: 978-1-4302-4732-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)