Exploit - the implementation of a threat against a vulnerability (previously synonymous with Attack).Vulnerability - any weakness which makes possible a threat to an asset.Threat - any potential occurrence (malicious or inadvertent) that could harm or impede an asset.database data, file system data, system resource. Pause: Michael wipes his hand down his face and forces a smile. Michael: You mean you're going to design something, build it, pretend to test it, and then ask me to find the security vulnerabilities? Paige: Don't be so grumpy. Michael: So? Paige: Seriously, I want your help building this system I'm working on. Scene I A small hallway between two sets of cubicles, supposedly designed to enhance agile software development and communication. Michael: a simple security guy at Microsoft. Day O’ Security An Introduction to the Microsoft Security Development Lifecycle Day 1: Threat Modelling - CIA and STRIDEĪ Threat Modelling Conversation The Thespians Paige: a young, bright software developer.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |