Skip to main content
. 2014 Mar 12;5(4):463–472. doi: 10.1016/j.jare.2014.03.001

Table 1.

Example of security catalog item.

Threat
Category: Tampering
Title: Tampering stored data
Abuse frame Fig. 6



Security requirement
Security concern: Integrity
Title: Integrity preserving of stored data
Security problem frame Fig. 7
Threat
Category: Tampering
Title: Tampering stored data
Abuse frame Fig. 6



Security requirement
Security concern: Integrity
Title: Integrity preserving of stored data
Security problem frame Fig. 7