Threat Modeling

12345678910
Across
  1. 2. A diagram representing data flows in a software system
  2. 4. Preventing legitimate access to resources
  3. 6. Exposing sensitive information to unauthorized users
  4. 7. A technique that helps visualize and analyze threats
  5. 9. Unauthorized changes to data
  6. 10. Recording system activity to detect or investigate security issues
Down
  1. 1. A network-based attack pretending to be a trusted source (IP Spoofing)
  2. 3. A network security system that monitors and controls incoming and outgoing traffic
  3. 5. Pretending to be someone else
  4. 6. A tool developed by OWASP for creating threat models (Threat ?)
  5. 8. Attacker repeats valid data transmission (? Attack)