Threat model

Results: 162



#Item
1Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:18:07
2Cyberwarfare / Computer security / Computing / Computer network security / Threat model / Hacking / Software testing / Threat / STRIDE / Vulnerability / SQL injection / Security

Microsoft PowerPoint - ISSA threat modeling.ppt [Read-Only]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:19
3Hacking / Computer security / Computer network security / Software testing / Vulnerability / Cross-site scripting / Application security / Threat model

Microsoft PowerPoint - DenimGroup_JumpStartYourApplicationSecurityKnowledge_Content.pptx

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:55
4Computer security / Computer network security / Threat model / SQL injection / Web application security / Attack / Server / Threat / Database / HDIV / Cross-site scripting

Microsoft PowerPoint - OWASP_SanAntonio_February2006_SecondMostSecureDatabase.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:30:26
5Computer security / Vulnerability / Information security / Application security / Threat model / Software development / Software / Threat / Draft:ICT Security Policy System: A Case Study / Mobile security

ISSA ISSA Journal | November 2009 The Global Voice of Information Security

Add to Reading List

Source URL: www.denimgroup.com

Language: English - Date: 2014-01-13 18:22:32
6

Child Maltreatment and Autonomic Nervous System Reactivity: Identifying Dysregulated Stress Reactivity Patterns by Using the Biopsychosocial Model of Challenge and Threat KATIE A. MCLAUGHLIN, PHD, MARGARET A. SHERIDAN, P

Add to Reading List

Source URL: wendyberrymendes.com

Language: English - Date: 2016-03-10 16:22:32
    7Social status / Behavior / Gender studies / Psychology / Gender role / Human behavior / Role theory / Gender / Stereotype threat

    ARTICLE IN PRESS G Model JEBO-2771; No. of Pages 7 Journal of Economic Behavior & Organization xxxxxx–xxx

    Add to Reading List

    Source URL: pareto.uab.es

    Language: English - Date: 2011-08-31 05:28:50
    8Cyberwarfare / Security / Computer security / Computer network security / Cybercrime / National security / Threat / Vulnerability / Threat Intelligence Platform / Threat model

    SANDIA REPORT SAND2007-5791 Unlimited Release Printed SeptemberCategorizing Threat

    Add to Reading List

    Source URL: www.idart.sandia.gov

    Language: English - Date: 2009-05-07 12:36:27
    9

    Secure Untrusted Data Repository (SUNDR) Li, Krohn, Mazieres, and Shasha Why did I assign this paper? • very different threat model, one that is becoming more and more relevant because of cloud. still learning the fund

    Add to Reading List

    Source URL: courses.cs.washington.edu

    Language: English - Date: 2013-06-14 13:56:48
      10Computing / Computer security / Software / Project management / Threat model / Business / Enterprise modelling / Software engineering / Process management / Threat / Software development / Business process modeling

      Experiences Threat Modeling at Microsoft Adam Shostack Microsoft Abstract. Describes a decade of experience threat modeling products

      Add to Reading List

      Source URL: adam.shostack.org

      Language: English - Date: 2014-06-11 12:01:57
      UPDATE