8. 参考情報

  • ABOUT US. (n.d.). 取得元 OWASPP SAMM: https://owaspsamm.org/

  • c0rdis. (2020, January 21). security champions playbook. https://github.com/c0rdis/security-champions-playbook

  • Common Vulnerability Scoring System SIG. (n.d.). 取得元 First: https://www.first.org/cvss/

  • Gavin, B. (2019, November 12). What is G Suite, Anyway? 取得元 howtogeek: https://www.howtogeek.com/411808/what-is-g-suite-anyway/

  • (2018). ISO/IEC 27005. ISO. 取得元 Wikipedia: https://en.wikipedia.org/wiki/ISO/IEC_27005

  • Juuso, S. (2019, May). Evaluation of Threat Modeling. JAMK University of Applied Sciences.

  • LINDDUN privacy engineering. (n.d.). 取得元 LINDDUN: https://www.linddun.org/

  • Microsoft Teams. (2020, 9 8). 取得元 Wikipedia: https://en.wikipedia.org/wiki/Microsoft_Teams

  • OWASP Application Security Verification Standard. (n.d.). 取得元 OWASP: https://owasp.org/www-project-application-security-verification-standard/

  • Schneier, B. (1999). Attack Trees. Dr. Dobb's Journal.

  • What is Azure DevOps. (n.d.). 取得元 microsoft docs: https://docs.microsoft.com/nl-nl/azure/devops/user-guide/what-is-azure-devops?view=azure-devops

  • What is DevSecOps. (n.d.). 取得元 redhat: https://www.redhat.com/en/topics/devops/what-is-devsecops

  • What is Jira used for. (n.d.). 取得元 atlassian: https://www.atlassian.com/software/jira/guides/use-cases/what-is-jira-used-for

  • Yskout, K., Sion, L., Heyman, T., Wuyts, K., Van Landuyt, D., & Joosen, W. (2020, May 23). Threat modeling: from infancy to maturity. International Conference on Software Engineering. Seoul, South Korea: Institute of Electrical and Electronics Engineers. 取得元 https://lirias.kuleuven.be/2947593

Last updated