Security Architecture & Design

profilegbnani

  

In chapter 7, you will have learned how to get started looking for threats, including when and where to start and how to iterate through a diagram. The chapter also provides a set of tables and lists that you might use as you threat model.

Provide a 500-word report on the at least two (2) tools and techniques that you can use to manage a threat modeling project. For each, you must provide the following:

1. Provide the tool/technique name

2. Describe the tool/technique

3. Provide advantages/disadvantages of using tool/technique




Find Attached Documents

  • 4 years ago
  • 15
Answer(1)

Purchase the answer to view it

blurred-text
NOT RATED
  • attachment
    Threatmodeling.docx
  • attachment
    threatmodeling.pdf