Threat modeling with Owasp Threat Dragon & risk rating a vulnerability

Using STRIDE and OWASP Threat Dragon, one can find the threats that impact their architecture. Once identified, you will be able to formulate the remediation and/or mitigation that can be implemented in order to provide a more secure system.

Detalles Bibliográficos
Autor Corporativo: Manning (Firm), publisher (publisher)
Otros Autores: Fisher, Derek, presenter (presenter)
Formato: Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Manning Publications [2022].
Edición:[First edition]
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009822756106719
Descripción
Sumario:Using STRIDE and OWASP Threat Dragon, one can find the threats that impact their architecture. Once identified, you will be able to formulate the remediation and/or mitigation that can be implemented in order to provide a more secure system.
Descripción Física:1 online resource (1 video file (26 min.)) : sound, color