Automated Threat Modeling using IRIUSRISK

Поделиться
HTML-код
  • Опубликовано: 25 авг 2024
  • 1. Decompose the application
    2. Determine and Rank Threats
    3. Determine countermeasures and mitigation
    Support my work:
    www.buymeacoff...

Комментарии • 7

  • @DevSecHacker
    @DevSecHacker  4 месяца назад

    if you want to support my work:
    www.buymeacoffee.com/devsechacker

  • @flowersareyellow
    @flowersareyellow 17 дней назад

    Do you think this tool is good for future career?

    • @DevSecHacker
      @DevSecHacker  17 дней назад

      It is good for a career only. Because whatever the tools come into the picture finally a human intelligence should validate the accuracy of threats or findings.
      The advantage of it is we can make the threat modeling process faster and efficient.

  • @basedviking8183
    @basedviking8183 8 месяцев назад

    great tule!

  • @binaynayak1720
    @binaynayak1720 Месяц назад

    How to edit the Trust zone?

    • @DevSecHacker
      @DevSecHacker  24 дня назад

      Right click on trust zone and edit