John is software designer, who is currently working on CHANSONS-KART application software which is e-business application Peter is a security testing expert who is coordinating with John for threat modelling, When these two are involved in designing the payment subsystem, what and all are the potential parameters they need to concentrate on?
Answers
Answered by
1
Answer:
This How To describes an approach for creating a threat model for a Web application. The threat modeling activity helps you to model your security design so that you can expose potential security design flaws and vulnerabilities before you invest significant time or resources in a flawed design and/or problems become difficult to reverse. This How To provides prioritized vulnerability categories and a threat list to make the threat modeling activity easier.
Similar questions