x Take the InfoQ Survey !

Threat Modeling  Content on InfoQ rss

Articles about Threat Modeling rss

UED: The Unified Execution Diagram by Carlo van Asma & Pascal Wolkotte Posted on Oct 18, 2015 Today’s software applications have a lot of concurrent tasks that are distributed over multiple threads, processes, processors and PCs. This article introduces a visual modeling technique to describe and specify the application’s execution architecture. Within Philips Healthcare the Unified Execution Diagram has proven to be very useful for designing and documenting the execution architecture. 4

How to Start With Security by Rémon (Ray) Sinnema Posted on Mar 14, 2015 Computer security, or the lack thereof, has made many headlines recently. In this article we'll look at how bad things are and what you, as a software developer, can do about it. It will help get you started or hopefully give you some new ideas if you're already doing some security work.

Developer-Driven Threat Modeling by Danny Dhillon Posted on Nov 11, 2011 Threat modeling is critical for assessing and mitigating the security risks in software systems. In this IEEE article, author Danny Dhillon discusses a developer-driven threat modeling approach to identify threats using the dataflow diagrams. 1

Resilient Security Architecture by John Diamant Posted on Sep 27, 2011 In this IEEE article, author John Diamant talks about how to improve security quality of software applications using a proactive approach with techniques like Security requirements gap analysis and Architectural threat analysis in the early phases of software development life cycle.

Presentations about Threat Modeling rss

Real Threat and Real Defenses – Case Study of the Unknown by Alex Holden Posted on Sep 03, 2015 Alex Holden examines hackers’ techniques, skills, and shortfalls. He takes a snapshot of the current threat landscape and derives practical lessons by analyzing a number of high profile breaches.

General Feedback
Marketing and all content copyright © 2006-2015 C4Media Inc. hosted at Contegix, the best ISP we've ever worked with.
Privacy policy