Threat modeling with Owasp Threat Dragon & risk rating a vulnerability.
Using STRIDE and OWASP Threat Dragon, one can find the threats that impact their architecture. Once identified, you will be able to formulate the remediation and/or mitigation that can be implemented in order to provide a more secure system.
Clasificación: | Libro Electrónico |
---|---|
Formato: | Electrónico Video |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified] :
Manning Publications,
[2022].
|
Edición: | [First edition]. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Threat hunting : a guide to proactive network defense /
por: Collins, Michael (Michael Patrick)
Publicado: (2018) -
The current security threat landscape.
Publicado: (2016) -
Advanced persistent threat : understanding the danger and how to protect your organization /
por: Cole, Eric
Publicado: (2013) -
How to define and build an effective cyber threat intelligence capability /
por: Dalziel, Henry
Publicado: (2015) -
Outfox'em : Protecting Yourself and Your Family from Cyber Threats.
por: McDonough, Bart R.
Publicado: (2018)