SDL Threat Modeling Tool 3. 1. 2008 |
Company:
Microsoft
|
Date Added: August 10, 2012 | Visits: 566 |
|
||||||||||
The Microsoft SDL Threat Modeling Tool allows for early and structured analysis and proactive mitigation and tracking of potential security issues. The SDL Threat Modeling Tool helps engineers analyze the security of their systems to find and address design issues early in the software lifecycle. The SDL Threat Modeling Tool version 3.1.6 Beta supports Visio 2010. Additional improvements in this version include UI improvements and bug fixes from the previous 3.1 release. Threat models creates by version 3.1. are compatible with version 3.1.6, but backwards compatibility (version 3.1.6 to version 3.1.) is not supported.
|
License: Freeware | Size: 3.6 MB |
USER REVIEWS
SDL THREAT MODELING TOOL RELATED
Security Tools
-
Enterprise Security Analyzer 2.5
Enterprise Security Analyzer (ESA) provides essential security intelligence layer across enterprise-wide IT infrastructure. It combines innovative topology-based Threat Visualization with SIEM and asset management to aid in security operations... |
24.13 MB | |
Server Tools
-
Adaptive Security Analyzer IIS 1.0 Beta
Adaptive Security Analyzer IIS (ASA IIS) protects Windows-based web servers from known and unknown vulnerabilities like Directory Traversal, Buffer Overflow, Parser Evasion, High-bit Shellcode, and Remote Data Services, as well as various types of... |
13.48 MB | |
Development Tools
-
mbsa2txt 1.0
This script allows you to read the Microsoft Baseline Security Analyzer 1.2.1 XML output and sends it to standard output in a readable text format. |
||
Server Management
-
Intrusion Detection for Apache 1.0
Ida, is an Apache log security analyzer written in PHP. It will scan Apache logs and report about security incidents like SQL injections, XSS attacks, path traveling and so on. |
||
Security Tools
-
Ida - Intrusion Detection for Apache alpha3
Ida, is a Apache log security analyzer written in PHP. It will scan Apache logs and report about security incidents like SQL injections, XSS attacks, path traveling and so on. |
7.1 KB | |
Multimedia
-
Real Time Analyzer Script 1.1
Real Time Analyzer uses your sound card input and analyze the frequency response.This application works like a real spectrum analyzer. It uses the line / mic input of the sound card and is great for testing speaker response. |
71.68 KB | |
Security Tools
-
Obol 0.2007.01.19
Obol is part of a project to investigate properties of security protocols, what they are, how they behave, how they interact, how to deal with them. The Obol language grew out of a desire to escape the distractions of low-level implementation... |
15 MB | |
Utilities
-
TAMS Analyzer 4.32b3
TAMS Analyzer for Macintosh OS X:The native Open source, Macintosh Qualitative Research Tool TAMS stands for Text Analysis Markup System. It is a convention for identifying themes in texts (web pages, interviews, field notes). It was... |
15.2 MB | |
Backup Utilities
-
Text Analysis Markup System 4.13b10
TAMS stands for Text Analysis Markup System. It is a convention for identifying themes in texts (web pages, interviews, field notes). It was designed for use in ethnographic and discourse research. TAMS Analyzer is a program that works... |
15.14 MB | |
Multimedia & Graphics
-
UNPHASED 3.1.5
UNPHASED is a small, simple, Java based application specially designed to offer users a versatile tool for performing genetic association analysis. This utility implements maximum-likelihood inference on haplotype and genotype effects while... |
NEW DOWNLOADS IN WINDOWS SOFTWARE, SECURITY TOOLS
Windows Software
-
iTop Screen Recorder 4.5.0.1385
iTop Screen Recorder is an all-in-one screen recorder, video editor, and screenshot tool. It helps capture anything on your PC screen to be a high-quality video file or screenshot, as well as edit the recorded videos and local videos to make them... |
144.59 MB | |
Windows Software
-
Lock Cursor Tools 7.0
Lock Cursor Tools simply locks the mouse cursor. You may choose a predetermined area, the primary or secondary monitor screen or part of the window of a particular application. Lock Cursor Tools makes your computer work more productively by... |
1.34 MB | |
Windows Software
-
Sync2 Cloud 2.10
Synchronizing Outlook between multiple sources now made easy with Sync2 Cloud, powerful Microsoft Outlook synchronization software. Sync Outlook Calendar, Contacts and Tasks between multiple sources. Share Outlook Calendar with others without... |
28.29 MB | |
Windows Software
-
WDZ Hash Generator 1.0
A simple program that can generate hashes such as md5, sha1, sha2 and many others. Hash function - a function assigning any short number to any large number, always having a fixed size, non-specific, quasi-random value, so-called irreversible... |
2.27 MB | |
Windows Software
-
WriterHelper 1
WriterHelper consist of WordNet Dictionary, WordNet Thesaurus, Plagairism Checker, Encryption using TripleDES, DES, and AES. WriterHelper helps you to search for dictionary, thesurus using WordNet Dictionary, Encrypt Text using AES, DES,... |
223 KB | |
Security Tools
-
Privacy Eraser Free 6.4
Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Microsoft Edge, Mozilla Firefox,... |
9.41 MB | |
Security Tools
-
WinGPG 1.0.1.1
WinGPG developed by Scand Ltd. is a tray-based classical Windows application and a classic GPGv2 distribution (we use the cryptography from the official site without making any modifications). It supports the following operations:... |
9.39 MB | |
Security Tools
-
USB Lockit 1.0
USB Lockit - Password Lock USB Drive. Protects the USB drive with your photos, audios, videos and other files from prying eyes on Android & Windows. Once the drive is locked, nobody can access your files. All in 3 Easy Steps: 1. To lock... |
11 KB | |
Security Tools
-
Overwrite Program 1.4
Overwrite Program is a program that overwrites empty space on disk, data and metadata. The operating systems and programs automatically write and delete data on disk, for example text editors may save copies of the document for recovery and... |
407 KB | |
Security Tools
-
Security Camera Viewer 5.2
If you have one or more IP cameras, then you also need software that is able to receive and display a video stream from these devices. Most likely you will also want to monitor access to the rooms in automatic mode. A modern security system should... |
29.53 MB |