Threat modeling with Owasp Threat Dragon & risk rating a vulnerability
Using STRIDE and OWASP Threat Dragon, one can find the threats that impact their architecture. Once identified, you will be able to formulate the remediation and/or mitigation that can be implemented in order to provide a more secure system.
Autor Corporativo: | |
---|---|
Otros Autores: | |
Formato: | Video |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified] :
Manning Publications
[2022].
|
Edición: | [First edition] |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009822756106719 |
Sumario: | Using STRIDE and OWASP Threat Dragon, one can find the threats that impact their architecture. Once identified, you will be able to formulate the remediation and/or mitigation that can be implemented in order to provide a more secure system. |
---|---|
Descripción Física: | 1 online resource (1 video file (26 min.)) : sound, color |