O'Reilly logo
  • shaikha saeed thinks this is interesting:

Identifying and Analyzing Threats, Vulnerabilities, and Exploits

Note

195 – 196 are explain threat assessments
Why do need it? To find / identify the threatens, vulnerabilities, and the kind.
Confidentially - Steal the data
Integrity - manipulate
Availability - Stop from viewing the data