Recommended Resources
Please use the following author’s names, book/article titles, Web sites, and/or keywords to
search for supplementary information to augment your learning in this subject.
– Tony Uceda Velez & Marco M. Morana
– Rick Centric Threat Modeling: Process for Attack Simulation and Threat Analysis
Information Search
Use the following keywords to search for additional online resources that may be used for
supporting your work on the course assignments:
– Threat modeling
– Security architecture
– STRIDE – Countermeasure
– Attack tree
– Computer security
– Information security
– Threat
– Vulnerability
– Software security assurance
Other articles and readings may be assigned by course professor
week_4_ia_2_.pdf

Directly chat?
Do you need any help from us?
Hello
Thankyou for visiting our website. We can help you to place your order via the order system. Just send the instructions including attachments to our WhatsApp Live chat.
Thank you!