threat_modelling
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
threat_modelling [2019/08/09 19:18] โ neil | threat_modelling [2019/08/15 14:07] โ neil | ||
---|---|---|---|
Line 67: | Line 67: | ||
Something which is likely to be exploited, and which would cause a high level of harm, is a greater priority than something either unlikely to happen, or which is unlikely to cause much harm if it did happen. | Something which is likely to be exploited, and which would cause a high level of harm, is a greater priority than something either unlikely to happen, or which is unlikely to cause much harm if it did happen. | ||
+ | |||
+ | Bear in mind that some security controls are appropriate for highly confidential information, | ||
+ | |||
threat_modelling.txt ยท Last modified: 2021/10/15 10:25 by neil