Threat Modeling
Across
- 2. A diagram representing data flows in a software system
- 4. Preventing legitimate access to resources
- 6. Exposing sensitive information to unauthorized users
- 7. A technique that helps visualize and analyze threats
- 9. Unauthorized changes to data
- 10. Recording system activity to detect or investigate security issues
Down
- 1. A network-based attack pretending to be a trusted source (IP Spoofing)
- 3. A network security system that monitors and controls incoming and outgoing traffic
- 5. Pretending to be someone else
- 6. A tool developed by OWASP for creating threat models (Threat ?)
- 8. Attacker repeats valid data transmission (? Attack)