User Tools

Site Tools


Threat modelling

With a systematic analysis of the probable attacker's profile, the most likely attack vectors, and the assets most desired by an attacker, defenders can focus on what is most important to protect. It's systematic, and like penetration testing, a dance.

en/threats/start.txt · Last modified: 2020/07/03 17:23 by Digital Dot