Threat model

Results: 162



#Item
41Computer security / Hypergraph / Vulnerability / Access control / Topology / Social vulnerability / Threat / Conceptual model / Graph rewriting / Security / Cyberwarfare / Computer network security

Representing Humans in System Security Models: An Actor-Network Approach Wolter Pieters University of Twente Enschede, The Netherlands

Add to Reading List

Source URL: isyou.info

Language: English - Date: 2011-08-07 11:38:37
42Science / Environmental economics / Problem solving / Fritz Zwicky / Wicked problem / Model / Policy analysis / Radioactive waste / Politics / Creativity / Policy / Morphological analysis

Threat Analysis for the Transport of Radioactive Material Adapted from a paper presented at the 15th International Symposium on the Packaging and Transportation of Radioactive Materials [PATRAM 2007, Miami] [Also publish

Add to Reading List

Source URL: www.swemorph.com

Language: English - Date: 2011-03-24 09:26:29
43Cyberwarfare / Crime prevention / National security / Computer network security / Threat model / Application security / Physical security / Threat / Security / Computer security / Public safety

Eleanor Saitta Objective: Experience:

Add to Reading List

Source URL: dymaxion.org

Language: English - Date: 2015-01-28 07:38:29
44Computer security / Hypergraph / Vulnerability / Access control / Topology / Social vulnerability / Threat / Conceptual model / Graph rewriting / Security / Cyberwarfare / Computer network security

Representing Humans in System Security Models: An Actor-Network Approach Wolter Pieters University of Twente Enschede, The Netherlands

Add to Reading List

Source URL: eprints.eemcs.utwente.nl

Language: English - Date: 2011-08-07 11:38:37
45Threat / Diagram / Scientific modelling / Science / Epistemology / Computer security / Cyberwarfare / Threat model

The Trouble with Threat Modeling   Adam Shostack here. I said recently that I wanted to talk more about what I do. The core of what I do is help Microsoft’s product teams analyze the security of their designs by thr

Add to Reading List

Source URL: www.homeport.org

Language: English - Date: 2014-06-11 11:56:21
46Cyberwarfare / Videotelephony / Computer network security / Malware / Stuxnet / Targeted threat / Denial-of-service attack / Social engineering / Voice over IP / Software / Computing / System software

The Slingshot Project Measuring, analyzing, and defending against targeted attacks Stevens Le Blond Software security model

Add to Reading List

Source URL: www.dfn-cert.de

Language: English - Date: 2015-03-06 09:40:10
47Cyberwarfare / Public safety / Data security / Crime prevention / National security / Threat model / Security Patterns / Information security management system / Threat / Security / Computer security / Computer network security

Towards a quantitative assessment of security in software architectures Artsiom Yautsiukhin2∗ Riccardo Scandariato2 Thomas Heyman2

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2010-06-18 12:29:02
48Microsoft / Trustworthy computing / Application security / Firefox / Software bug / Threat model / Michael Howard / Windows XP / Attack Surface Analyzer / Software / Computing / Computer security

Life in the Digital Crosshairs The dawn of the Microsoft Security Development Lifecycle The dawn of Microsoft Trustworthy Computing

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2014-05-20 17:31:10
49Computer network security / Software testing / Electronic commerce / Data security / Penetration test / McAfee / Vulnerability / Application security / Threat model / Computer security / Security / Cyberwarfare

Data Sheet McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:16:17
50Computer network security / Software testing / Electronic commerce / Data security / Penetration test / McAfee / Vulnerability / Application security / Threat model / Computer security / Security / Cyberwarfare

Data Sheet McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:16:17
UPDATE