From: Risk-driven security testing using risk analysis with threat modeling approach
Element | Spoofing | Tampering | Repudiation | Information disclosure | Denial of service | Elevation of privilege |
---|---|---|---|---|---|---|
Data Flow | Â | X | Â | X | X | Â |
Data Store | Â | X | Â | X | X | Â |
Process | X | X | X | X | X | X |
Interactor | X | Â | X | Â | Â | Â |