We need different techniques to discover threats against a system to complement the traditional ones if they do not work.
Create attack chains as TM technique. Extedend possibly using DFD as connection maps, layered defence and attack patterns.
An example of an attack chain.
Register as participant
To register as participant add
Attack chains as TM technique to either:
sessionsmetadata field from your participant's page (find your participant page and look for the edit link).
- or the
participantsmetadata field from this git session page
Back to list of all Working Sessions