Table 1.
Example of security catalog item.
Threat |
Category: Tampering |
Title: Tampering stored data |
Abuse frame Fig. 6 |
Security requirement |
Security concern: Integrity |
Title: Integrity preserving of stored data |
Security problem frame Fig. 7 |
Threat |
Category: Tampering |
Title: Tampering stored data |
Abuse frame Fig. 6 |
Security requirement |
Security concern: Integrity |
Title: Integrity preserving of stored data |
Security problem frame Fig. 7 |