Threat modeling with Owasp Threat Dragon & risk rating a vulnerability

Using STRIDE and OWASP Threat Dragon, one can find the threats that impact their architecture. Once identified, you will be able to formulate the remediation and/or mitigation that can be implemented in order to provide a more secure system

Bibliographic Details
Format: eBook
Language:English
Published: [Place of publication not identified] Manning Publications 2022
Edition:[First edition]
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Description
Summary:Using STRIDE and OWASP Threat Dragon, one can find the threats that impact their architecture. Once identified, you will be able to formulate the remediation and/or mitigation that can be implemented in order to provide a more secure system
Physical Description:1 video file (26 min.) sound, color