| 1. | Threat modeling resources 建立威胁模型的资源 |
| 2. | The stride threat model Stride威胁模型 |
| 3. | For more information about threat modeling asp . net applications , see 有关为asp . net应用程序建立威胁模型的更多信息,请参见 |
| 4. | Prepare in advance for the security review , and begin by carefully creating a threat model 应事先为安全检查做好准备,然后以认真创建一个威胁模型作为起始工作。 |
| 5. | Site on msdn , which provides links to additional resources for understanding the threat modeling process 站点,其中提供了用于了解建立威胁模型的过程的其他资源的链接。 |
| 6. | It discusses data storage format and the conception of threat model , which can add the threat to digital map that can transform the threat avoidance to terrain avoidance 讨论了数字地图数据的存储格式。提出了威胁模型的概念,并且把威胁叠加到数字地图中,把威胁回避转化为地形回避来处理。 |
| 7. | It is important to understand all aspects of security , from the process of threat modeling during the design phase of your application to its eventual deployment , and continuing through its ongoing maintenance 从应用程序设计阶段期间威胁建模的进程,到其最终部署及继续完成正在进行的维护,了解安全性的所有方面非常重要。 |
| 8. | It is therefore important to understand all aspects of security , from the process of threat modeling during the design phase of your application , to its eventual deployment and ongoing maintenance 一定要了解安全的各个方面,从应用程序设计阶段建立威胁模型的过程,到应用程序的最终部署,到对应用程序的不断的实时维护,都要考虑到。 |
| 9. | Threat modeling , is necessary to determine the likelihood and ramifications of security breaches in your ado . net application . threat modeling iteratively evaluates and ranks potential threats , along with appropriate mitigation techniques 评估安全威胁的过程,称之为“建立威胁模型” ,对于确定ado . net应用程序中安全受到破坏的可能性和后果来说,是必不可少的。 |
| 10. | It is discussed that exploiting scanning and utilization at last . meanwhile the conception and main principle of safe programming and safe threat model is presented , which is very meaningful in improving the quality of software development 同时为了实现在源代码级消除安全漏洞的目的,本文探讨了利用安全威胁模型进行安全编程的方法,并提出了安全编程整体模型的框架和原则,对安全编程方法作了比较详尽的讨论,为今后进一步的研究打下了基础。 |