Hacking connected cars : tactics, techniques, and procedures /
Chapter 3 Threat Modeling -- STRIDE Model -- Threat Modeling Using STRIDE -- VAST -- PASTA -- Stage 1: Define the Business and Security Objectives -- Stage 2: Define the Technical Scope -- Stage 3: Decompose the Application -- Stage 4: Identify Threat Agents -- Stage 5: Identify the Vulnerabilities...
| Cote: | Libro Electrónico |
|---|---|
| Auteur principal: | |
| Format: | Électronique eBook |
| Langue: | Inglés |
| Publié: |
Indianapolis, Indiana :
John Wiley & Sons, Inc.,
[2020]
|
| Sujets: | |
| Accès en ligne: | Texto completo |


