威胁建模简介
本文为摘录(或转载),侵删,原文为: -https://learn.microsoft.com/zh-cn/training/modules/tm-introduction-to-threat-modeling/5-step-4-verify-phase -https://learn.microsoft.com/zh-cn/training/modules/tm-introduction-to-threat-modeling/4-step-3-fix-phase -https://learn.microsoft.com/zh-cn/training/modules/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/7-elevation-of-privilege-having-permissions-i-should-not-have -https://learn.microsoft.com/zh-cn/training/modules/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/6-denial-of-service-overwhelming-the-system -https://learn.microsoft.com/zh-cn/training/modules/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/5-information-disclosure-seeing-data-i-am-not-supposed-to-see -https://learn.microsoft.com/zh-cn/training/modules/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/4-repudiation-not-claiming-responsibility-for-an-action-taken -https://learn.microsoft.com/zh-cn/training/modules/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/3-tampering-changing-data-without-authorization -https://learn.microsoft.com/zh-cn/training/modules/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/2-spoofing-pretending-to-be-someone-or-something-else -https://learn.microsoft.com/zh-cn/training/modules/tm-introduction-to-threat-modeling/3-step-2-break-phase -https://learn.microsoft.com/zh-cn/training/modules/tm-introduction-to-threat-modeling/2-step-1-design-phase -https://learn.microsoft.com/zh-cn/training/modules/tm-introduction-to-threat-modeling/1-introduction -https://learn.microsoft.com/zh-cn/training/modules/tm-introduction-to-threat-modeling/1b-threat-modeling-phases
https://learn.microsoft.com/zh-cn/training/modules/tm-introduction-to-threat-modeling