The chapter on threat modeling and risk assessment is particularly important.
“威协建模和危险评估”这一章非常重要。
Threat modeling is composed of three high-level steps: understanding the adversary's view, characterizing the security of the system, and determining threats.
威胁模型是由三个高阶步骤所组成:了解敌人的观点、描绘系统安全性的特徵,以及判断威胁来源。
Threat modeling is an iterative approach to assessing vulnerabilities in your application to find those that are the most dangerous because they expose the most sensitive data.
威胁建模是一种迭代方法,用于评估应用程序中的漏洞,以找到可公开敏感数据的最危险的漏洞。
It is therefore important to understand all aspects of security, from the process of threat modeling during the design phase of your application, to its eventual deployment and ongoing maintenance.
因此,了解安全性的各个方面(从应用程序设计阶段期间的威胁建模过程到应用程序的最终部署和不断的维护)非常重要。
The report calls Moss “a fashion world double threat” because of her lucrative modeling and designing gigs.
因为莫斯在模特和设计事业上都收入颇丰,福布斯称其为“时尚界的双重威胁”。
The content of battle damage simulation is briefly introduced in this paper, while the basic structure and modeling methods of threat model, equipment model and damage model are discussed in detail.
该文简要介绍了装备战斗损伤仿真的内容,详细论述了威胁模型、装备模型及损伤模型的基本结构及建模方法。
However, insider attack modeling and threat analysis tools have not been evolved at the same rate.
然而,攻击建模和威胁分析工具方面的研究仍处于摸索阶段。
However, insider attack modeling and threat analysis tools have not been evolved at the same rate.
然而,攻击建模和威胁分析工具方面的研究仍处于摸索阶段。
应用推荐