This article is especially related to the discourse of different sorts of threat demonstrating approaches which can be used to see potential threats to a Framework or moved presentation, and can be used as a required action for a DoD obtaining. Three system especially STRIDE, Security cards and Persona non Grata have been thought about and the conceivable consequences of every procedure are analyzed in this Article. A Drone structure with a little IT bolster system has been used as a model. Eventual outcomes of most of the methodologies have been researched subject to number of threats seen, number of thretas missed and number of false positives announced.
- -619125-752475Hemaid M