System Security Functions: Threat Analysis



Desktop example (7 potential threats in all): Server example (15 potential threats in all): Network example (8 potential threats in all):


NJ-CIP is funded by a grant provided by the Robert Wood Johnson Foundation. Direct comments and questions to Dr. Noam Arzt, arzt@isc.upenn.edu [7/31/95]
URL: http://www.cip.upenn.edu/cip/cdc/threats.html