Threat model

Results: 162



#Item
91Software architecture / Science / Software development process / Threat model / Systems engineering process / Design / Usability / Systems science / Knowledge / Software engineering / Formal methods / Systems engineering

Risk-Centric Model of Software Architecture George Fairbanks 16 November 2009 Rhino Research

Add to Reading List

Source URL: rhinoresearch.com

Language: English - Date: 2010-10-31 20:30:31
92Security / Intrusion detection system / Advanced persistent threat / Network intrusion detection system / Threat / Zero-day attack / Adversary model / Computer network security / Cyberwarfare / Computer security

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains Eric M. Hutchins∗, Michael J. Cloppert†, Rohan M. Amin, Ph.D.‡ Lockheed Martin Corporation

Add to Reading List

Source URL: papers.rohanamin.com

Language: English - Date: 2011-08-10 17:29:42
93Anticipatory thinking / Business continuity planning / Collaboration / Business continuity / Get Safe Online / Emergency management / Vulnerability / Online shopping / Threat / Computer security / Cyberwarfare / Management

www.cssc.gb.com This guide has been prepared as a directory of existing information. The information contained within are points you may to consider as part of you business continuity model. Further information can also

Add to Reading List

Source URL: www.cbi.org.uk

Language: English - Date: 2012-07-03 10:11:40
94Threat model / Two-factor authentication / Payment Card Industry Data Security Standard / Data center / Software development process / Security Technical Implementation Guide / Department of Defense Information Assurance Certification and Accreditation Process / Computer security / Computing / Information technology management

Security Technical Brief Ensure Security Without Compromise with Nutanix Defense in Depth Strategy Security Development Lifecycle The Nutanix Security Development Lifecycle (SecDL) incorporates security into every

Add to Reading List

Source URL: go.nutanix.com

Language: English - Date: 2014-12-13 18:32:35
95Nuclear proliferation / United States federal executive departments / Proliferation Security Initiative / Robert Joseph / United Nations Security Council Resolution / Weapon of mass destruction / Nuclear Threat Initiative / Commission on the Prevention of WMD proliferation and terrorism / Nuclear weapons / International relations / Arms control

The Proliferation Security Initiative: A Model for Future International Collaboration A Publication of the National Institute Publication Series August[removed]National Institute Press ®

Add to Reading List

Source URL: www.nipp.org

Language: English - Date: 2010-10-28 15:07:49
96International relations / United States federal executive departments / Lawrence Livermore National Laboratory / Robert Joseph / United States / Nuclear proliferation / Arms control / Nunn–Lugar Cooperative Threat Reduction

GLOBAL SECURITY ENGAGEMENT A New Model for Cooperative Threat Reduction[removed]The National Research Council report on strengthening and expanding Cooperative Threat Reduction (CTR) programs concludes that a new approach

Add to Reading List

Source URL: sites.nationalacademies.org

Language: English - Date: 2014-08-13 19:06:39
97OAuth / Network protocols / Access token / Cross-site request forgery / Session / Internet standards / Security token / RADIUS / Computing / Internet protocols / Cloud standards

RFC[removed]OAuth 2.0 Threat Model and Security Considerations

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2014-10-05 22:42:14
98

Pervasive Attack: 
 A Threat Model ! draft-barnes-pervasive-problem-00

Add to Reading List

Source URL: down.dsg.cs.tcd.ie

- Date: 2014-03-01 03:17:05
    99Cryptographic protocols / Internet protocols / Internet standards / Computer network security / Secure communication / Secure Shell / HTTP Secure / Domain Name System Security Extensions / Internet security / Computing / Internet / Network architecture

    Meet the new threat model, same as the old threat model Eric Rescorla Mozilla [removed] January 20, 2014

    Add to Reading List

    Source URL: www.w3.org

    Language: English - Date: 2014-02-07 14:41:45
    100Cyberwarfare / Risk assessment / Threat model / Threat / Computer security / Security / Risk

    Industry Threat Database and Guidelines PHMSA R&D Forum Threat Prevention Working Group #1 July 18, 2012 Dennis Jarnecke

    Add to Reading List

    Source URL: primis.phmsa.dot.gov

    Language: English - Date: 2012-07-26 17:04:06
    UPDATE