Security & Privacy / Other SDL Threat Modeling Tool - 3. 1. 2008 | The Microsoft SDL Threat Modeling Tool allows for early and structured analysis and proactive mitigation and tracking of potential security issues.
| Screenshot | Download | Developer's site | Broken Link?
|
|
| Rating: | Current Version: | 3. 1. 2008 | License: | Freeware | Downloads: | 6 |
| Download Now (File Size: 3.6 MB ) |
|
|
| Software Description: The Microsoft SDL Threat Modeling Tool allows for early and structured analysis and proactive mitigation and tracking of potential security issues. The SDL Threat Modeling Tool helps engineers analyze the security of their systems to find and address design issues early in the software lifecycle. The SDL Threat Modeling Tool version 3.1.6 Beta supports Visio 2010. Additional improvements in this version include UI improvements and bug fixes from the previous 3.1 release. Threat models creates by version 3.1. are compatible with version 3.1.6, but backwards compatibility (version 3.1.6 to version 3.1.) is not supported. | Software Requirements: | No specific requirements | This software is designed to run on the following operating systems: | SDL Threat Modeling Tool Keywords: | Analyze, Sdl, Threat, SDL Threat, Analyze Security, Security Analyzer | Download Link of SDL Threat Modeling Tool 3. 1. 2008: | - SDL Threat Modeling Tool - 3. 1. 2008 (File Size: 3.6 MB)
|
| |
|
|
| Reviews Summary: | Show All Reviews (0) |
| |
|
|
|
SDL Threat Modeling Tool related software |
---|
Title / Version / Description | Size | License | Price | ThreatMind 1.0 | 0 | Freeware | GNU General Public License (GPL)'/>A threat modeling tool based on FreeMind GNU General Public License (GPL) |
| Deep - Network Threat Simulation Tool 1.0 | 0 | Freeware | Network Threat Simulation Tool (NTST) will be able to effectively simulate any network security threat including worms, Trojans, spywares, & exploits. It will help in testing the effectiveness of network security devices like IDS/IPS/Firewall. GNU General Public License (GPL) |
| BinScope 1 2 | 2.4 MB | Freeware | BinScope is a Microsoft verification tool that analyzes binaries on a project-wide level to ensure that they have been built in compliance with Microsofta€™s Security Development Lifecycle (SDL) requirements and recommendations. BinScope checks that SDL-required compiler/linker flags are being set, strong-named assemblies are in use, up-to-date build tools are in place, and the latest good ATL headers are being used. BinScope also reports on... |
| Enterprise Architect for UML 2.1 v6.5 | 19.6 MB | Shareware | $135 | Enterprise Architect is a flexible, complete and powerful UML2.1 modeling tool for Windows platforms. It is an object oriented CASE tool providing the competitive edge for system development, project management and business analysis. Enterprise Architect is a comprehensive, full lifecycle, UML analysis and design tool, covering software development from requirements gathering, through to analysis, design, testing and maintenance. An... |
| ModelRight 3 | 27.0 MB | Shareware | 895USD | Do you need to design, visualize or document your database? ModelRight 3 can reverse engineer your existing database to get a graphical view of it, generate all the SQL statements to create the database, or synchronize your database model with the database to keep your design up to date. Do you need to control the most detailed aspects of your physical database? Do you need to control the most detailed aspects of your physical database?... |
|
|
|
Other popular software in this category |
---|
Title / Version / Description | Size | License | Price | vdocapture network video server 3.5 | 6.3 MB | Freeware | ip video server (client) that provides users with a easy way to remotely view any camera by using their Microsoft® Internet Explorer Web Browser as a camera viewer. This series of products to satisfy users to combine the company is a clear voice,specially designed for long-distance transmission of digital video and audio video, decoder products.Remote monitoring system needs to fully consider the characteristics,Video technology combines the... |
| OneNote Password 10.0.6745 | 514.0 KB | Shareware | $39 | Password recovery tool, which comes in very handy if you forgot your password for OneNote notebooks (*.one files). Such a situation might occur if someone who does not work with you anymore password protected some vital information that is absolutely necessary to retrieve. OneNote password protection is based on strong crypto algorithms, so password recovery is a complex task. OneNote Password uses various password recovery methods: Plain... |
| Index.dat Analyzer 2.0 | 906.6 KB | Freeware | Index.dat files are hidden files on your computer that contain all tracks of your online activity, where have you been on internet, what sites you visited, list of URL-s, files and documents you recently accessed. Index.dat files stored on your computer are obviously a potential privacy threat as they can be found and viewed without your knowledge. Index.dat Analyzer is free tool to view and delete contents of hidden index.dat files. |
| Privacy Eraser Portable 4.53.5 | 5.8 MB | Freeware | Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera. With simply one click, Privacy Eraser can quickly erase the Internet cache, cookies, browsing history, address bar history, typed urls, autocomplete form history, saved password and... |
| X13-VSA Voice Lie Detector 2.23.607 | 3.8 MB | Comercial | $179 | X13-VSA is a Voice Stress Analysis Lie Detector Software. The most advanced voice analysis technology available today. X13-VSA is an innovative, advanced and sophisticated software system and a fully computerized voice stress analyzer that allows you to detect the truth instantly. Based on an ingenious new and old algorithm to detect vocal stress. No one can lie to you any more because with X13-VSA you know what your friends and clients think... |
|
|
|
Latest Reviews |
---|
ConyEdit for Windows (reshim) - Dec 3, 2018 | Programmers feel the comfort of coding using ConyEdit which is capable to edit codes in batch mode and supports most of programming language. | Disc Cover Studio (harish) - Dec 19, 2017 | No need to go for a professional designer for the cover of new record, you can do it on your own sitting at home PC adding your own image on it with the Disc Cover Studio. | Kaspersky Security Scanner (Anthony) - Oct 12, 2017 | Scans software to find whether it is harmful for computer and also checks for updates of security patches. | Comodo Firewall (Maxmuller) - Sep 19, 2017 | This just another awesome product from Comodo to protect your computer from unwanted inbound or outbound traffic, also helps you analyze data packets. | TCP Splitter (Redrick) - Aug 10, 2017 | This lets the data packets we send split into several packages which is convenient for many applications to receive those and process one after another. | Project Viewer Lite (Tensialar) - Jul 19, 2017 | This is a light weight software for viewing MS project files easily without the MS project installed, all the personal who are involved in the project can view this with graphics and charts. | PDF Shaper Professional (Mortinus) - Jun 7, 2017 | I had difficulties with the pdf documents which needed to be edited before presentation, then I got PDF Shaper which helped me to take the texts / images out and insert my own texts plus other images. | Hotelare (Nielsine) - May 15, 2017 | You can enable your guests book any room instantly through your website, also receive the payments, other sections of your hotel can be also handled using the this software like restaurants, accounts, hr etc. | Copernic Desktop Search (Sokki) - Apr 19, 2017 | It gives good result of any keyword you are looking for compared to standard default file search tool, finds from any file saved in your computer. | SaferTech Secure Browser (Magaidh) - Apr 3, 2017 | Integrated pop up and ad block facilities, secure all the online transactions by protecting secret programs leaking your personal information. |
|
|
|
|