8. 参考情報
ABOUT US. (n.d.). 取得元 OWASPP SAMM: https://owaspsamm.org/
c0rdis. (2020, January 21). security champions playbook. https://github.com/c0rdis/security-champions-playbook
Common Vulnerability Scoring System SIG. (n.d.). 取得元 First: https://www.first.org/cvss/
Gavin, B. (2019, November 12). What is G Suite, Anyway? 取得元 howtogeek: https://www.howtogeek.com/411808/what-is-g-suite-anyway/
(2018). ISO/IEC 27005. ISO. 取得元 Wikipedia: https://en.wikipedia.org/wiki/ISO/IEC_27005
Juuso, S. (2019, May). Evaluation of Threat Modeling. JAMK University of Applied Sciences.
LINDDUN privacy engineering. (n.d.). 取得元 LINDDUN: https://www.linddun.org/
Microsoft Teams. (2020, 9 8). 取得元 Wikipedia: https://en.wikipedia.org/wiki/Microsoft_Teams
OWASP Application Security Verification Standard. (n.d.). 取得元 OWASP: https://owasp.org/www-project-application-security-verification-standard/
Schneier, B. (1999). Attack Trees. Dr. Dobb's Journal.
What is Azure DevOps. (n.d.). 取得元 microsoft docs: https://docs.microsoft.com/nl-nl/azure/devops/user-guide/what-is-azure-devops?view=azure-devops
What is DevSecOps. (n.d.). 取得元 redhat: https://www.redhat.com/en/topics/devops/what-is-devsecops
What is Jira used for. (n.d.). 取得元 atlassian: https://www.atlassian.com/software/jira/guides/use-cases/what-is-jira-used-for
Yskout, K., Sion, L., Heyman, T., Wuyts, K., Van Landuyt, D., & Joosen, W. (2020, May 23). Threat modeling: from infancy to maturity. International Conference on Software Engineering. Seoul, South Korea: Institute of Electrical and Electronics Engineers. 取得元 https://lirias.kuleuven.be/2947593
Last updated