User Tools

Site Tools


threat_modelling

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
threat_modelling [2019/08/09 20:18]
neil
threat_modelling [2019/08/15 15:07] (current)
neil
Line 67: Line 67:
  
 Something which is likely to be exploited, and which would cause a high level of harm, is a greater priority than something either unlikely to happen, or which is unlikely to cause much harm if it did happen. Something which is likely to be exploited, and which would cause a high level of harm, is a greater priority than something either unlikely to happen, or which is unlikely to cause much harm if it did happen.
 +
 +Bear in mind that some security controls are appropriate for highly confidential information,​ but some are less appropriate for less confidential information โ€” the likelihood of harm, or the severity of the harm, does not justify the intrusion or inconvenience. There comes a point at which providing security makes it more difficult for the client to work with you, contrary to their best interests.
 +
  
  
threat_modelling.txt ยท Last modified: 2019/08/15 15:07 by neil