TAS3 Threat Analysis (Draft 02)

Jan 20, 2010

Download as pdf
Multi page

Table of Contents (monolithic)

1 Introduction
2 Threat Analysis
2.1 Other work
2.2 Business threats
2.3 Trust model threats
2.4 Architectural threats
2.5 Trust misconfiguration threats
2.6 Protocol misconfiguration threats
2.7 Authorization misconfiguration threats
2.8 Ontology threats
2.9 Exposure threats
2.10 Privacy threats
2.11 Authentication threats
2.12 Impersonation threats
2.13 Repudiation threats
2.14 Unauditability threats
2.15 Software bug threats
2.16 Cloud threats
2.17 Service Availability Threats
3 Conclusion
4 Future work