TAS3 Threat Analysis (Draft 02)
Jan 20, 2010
Download as pdf
Single page
Table of Contents
1 Introduction
2 Threat Analysis
2.1 Other work
2.2 Business threats
2.3 Trust model threats
2.4 Architectural threats
2.5 Trust misconfiguration threats
2.6 Protocol misconfiguration threats
2.7 Authorization misconfiguration threats
2.8 Ontology threats
2.9 Exposure threats
2.10 Privacy threats
2.11 Authentication threats
2.12 Impersonation threats
2.13 Repudiation threats
2.14 Unauditability threats
2.15 Software bug threats
2.16 Cloud threats
2.17 Service Availability Threats
3 Conclusion
4 Future work